Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New Cmr JV2410180005.exe

Overview

General Information

Sample name:New Cmr JV2410180005.exe
Analysis ID:1541686
MD5:adf34c05adf9629f38d6388bceaad6fd
SHA1:12b9c57576e5b2ca7c3d070e68bada4f59a659ab
SHA256:2518788f855f3dd62be94e01361e96373b1a6d7b86f48e72d3bb899589200f09
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • New Cmr JV2410180005.exe (PID: 7044 cmdline: "C:\Users\user\Desktop\New Cmr JV2410180005.exe" MD5: ADF34C05ADF9629F38D6388BCEAAD6FD)
    • powershell.exe (PID: 1020 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 3668 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7528 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 432 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7212 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7236 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • kOtBoy.exe (PID: 7256 cmdline: C:\Users\user\AppData\Roaming\kOtBoy.exe MD5: ADF34C05ADF9629F38D6388BCEAAD6FD)
    • schtasks.exe (PID: 7664 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 7720 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 7728 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "admin@iaa-airferight.com", "Password": "manlikeyou88"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1886513393.00000000070C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000009.00000002.1941337532.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000012.00000002.2989084655.0000000002C4E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            0.2.New Cmr JV2410180005.exe.70c0000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.New Cmr JV2410180005.exe.3ed9970.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.New Cmr JV2410180005.exe.3ed9970.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    9.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 17 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ParentImage: C:\Users\user\Desktop\New Cmr JV2410180005.exe, ParentProcessId: 7044, ParentProcessName: New Cmr JV2410180005.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ProcessId: 1020, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ParentImage: C:\Users\user\Desktop\New Cmr JV2410180005.exe, ParentProcessId: 7044, ParentProcessName: New Cmr JV2410180005.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ProcessId: 1020, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\kOtBoy.exe, ParentImage: C:\Users\user\AppData\Roaming\kOtBoy.exe, ParentProcessId: 7256, ParentProcessName: kOtBoy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp", ProcessId: 7664, ProcessName: schtasks.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7236, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ParentImage: C:\Users\user\Desktop\New Cmr JV2410180005.exe, ParentProcessId: 7044, ParentProcessName: New Cmr JV2410180005.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", ProcessId: 432, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ParentImage: C:\Users\user\Desktop\New Cmr JV2410180005.exe, ParentProcessId: 7044, ParentProcessName: New Cmr JV2410180005.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ProcessId: 1020, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\New Cmr JV2410180005.exe", ParentImage: C:\Users\user\Desktop\New Cmr JV2410180005.exe, ParentProcessId: 7044, ParentProcessName: New Cmr JV2410180005.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp", ProcessId: 432, ProcessName: schtasks.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "admin@iaa-airferight.com", "Password": "manlikeyou88"}
                      Source: mail.iaa-airferight.comVirustotal: Detection: 7%Perma Link
                      Source: http://mail.iaa-airferight.comVirustotal: Detection: 7%Perma Link
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeReversingLabs: Detection: 71%
                      Source: New Cmr JV2410180005.exeReversingLabs: Detection: 71%
                      Source: New Cmr JV2410180005.exeVirustotal: Detection: 34%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeJoe Sandbox ML: detected
                      Source: New Cmr JV2410180005.exeJoe Sandbox ML: detected
                      Source: New Cmr JV2410180005.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: New Cmr JV2410180005.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: jwSv.pdbSHA256 source: New Cmr JV2410180005.exe, kOtBoy.exe.0.dr
                      Source: Binary string: jwSv.pdb source: New Cmr JV2410180005.exe, kOtBoy.exe.0.dr

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                      Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                      Source: global trafficTCP traffic: 192.168.2.4:49736 -> 46.175.148.58:25
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                      Source: RegSvcs.exe, 00000009.00000002.1941337532.0000000002CD6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2989084655.0000000002C56000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1882214707.0000000002F36000.00000004.00000800.00020000.00000000.sdmp, kOtBoy.exe, 0000000A.00000002.1946742054.00000000030E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, SKTzxzsJw.cs.Net Code: sf6jJs8S
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, SKTzxzsJw.cs.Net Code: sf6jJs8S

                      System Summary

                      barindex
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_016BDCBC0_2_016BDCBC
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_070F8B900_2_070F8B90
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_070F93920_2_070F9392
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_070FAAF00_2_070FAAF0
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_071006280_2_07100628
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_071031000_2_07103100
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_07107C680_2_07107C68
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710061B0_2_0710061B
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710B5580_2_0710B558
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710D4B30_2_0710D4B3
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710D4C00_2_0710D4C0
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_071002F80_2_071002F8
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_071002E80_2_071002E8
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710B1200_2_0710B120
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_071030F00_2_071030F0
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_07107C580_2_07107C58
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710ACE80_2_0710ACE8
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0CB30B670_2_0CB30B67
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0CB332D80_2_0CB332D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01309B389_2_01309B38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01304A989_2_01304A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0130CDB09_2_0130CDB0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01303E809_2_01303E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_013041C89_2_013041C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E856E09_2_05E856E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E800409_2_05E80040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E8BD089_2_05E8BD08
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E83F509_2_05E83F50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E88B9A9_2_05E88B9A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E8DB289_2_05E8DB28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E82B009_2_05E82B00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E89AE89_2_05E89AE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E850009_2_05E85000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E8323B9_2_05E8323B
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_02F34B0010_2_02F34B00
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_02F3DCBC10_2_02F3DCBC
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_07528B9010_2_07528B90
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_0752938810_2_07529388
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E062810_2_075E0628
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E310010_2_075E3100
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E7C6810_2_075E7C68
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E061A10_2_075E061A
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075EB55810_2_075EB558
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075ED4C010_2_075ED4C0
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075ED4B210_2_075ED4B2
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E02F810_2_075E02F8
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E02E810_2_075E02E8
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075EB12010_2_075EB120
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E30F010_2_075E30F0
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075E7C5810_2_075E7C58
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075EACE810_2_075EACE8
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_075EA8AA10_2_075EA8AA
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_0C36004010_2_0C360040
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_0C36001D10_2_0C36001D
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_0C3627B010_2_0C3627B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0108937818_2_01089378
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_01089B3818_2_01089B38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_01084A9818_2_01084A98
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_01083E8018_2_01083E80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_010841C818_2_010841C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0108E96F18_2_0108E96F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_060456E018_2_060456E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_06043F5018_2_06043F50
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0604DD1818_2_0604DD18
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_06049AE818_2_06049AE8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_06042B0018_2_06042B00
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_06048BA018_2_06048BA0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0604004018_2_06040040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0604325018_2_06043250
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 18_2_0604500018_2_06045000
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1882214707.0000000002F36000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7e5bb978-3a35-43a5-95fe-dd44d69d6a5a.exe4 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000000.1730147009.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejwSv.exe8 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1882214707.0000000002ED1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1881060907.000000000115E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7e5bb978-3a35-43a5-95fe-dd44d69d6a5a.exe4 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exe, 00000000.00000002.1888011613.0000000009810000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exeBinary or memory string: OriginalFilenamejwSv.exe8 vs New Cmr JV2410180005.exe
                      Source: New Cmr JV2410180005.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: New Cmr JV2410180005.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: kOtBoy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, MJjgHDK9738lOHXcKD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, MJjgHDK9738lOHXcKD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cf615UEWMrVo5fLfIW.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@23/15@1/1
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile created: C:\Users\user\AppData\Roaming\kOtBoy.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5576:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4464:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5496:120:WilError_03
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5941.tmpJump to behavior
                      Source: New Cmr JV2410180005.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: New Cmr JV2410180005.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: New Cmr JV2410180005.exeReversingLabs: Detection: 71%
                      Source: New Cmr JV2410180005.exeVirustotal: Detection: 34%
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile read: C:\Users\user\Desktop\New Cmr JV2410180005.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\New Cmr JV2410180005.exe "C:\Users\user\Desktop\New Cmr JV2410180005.exe"
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\kOtBoy.exe C:\Users\user\AppData\Roaming\kOtBoy.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: New Cmr JV2410180005.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: New Cmr JV2410180005.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: New Cmr JV2410180005.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: jwSv.pdbSHA256 source: New Cmr JV2410180005.exe, kOtBoy.exe.0.dr
                      Source: Binary string: jwSv.pdb source: New Cmr JV2410180005.exe, kOtBoy.exe.0.dr

                      Data Obfuscation

                      barindex
                      Source: 0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cf615UEWMrVo5fLfIW.cs.Net Code: LATFkkIbie System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cf615UEWMrVo5fLfIW.cs.Net Code: LATFkkIbie System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_070F9CC0 pushad ; retf 0_2_070F9D09
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeCode function: 0_2_0710FD38 push esp; ret 0_2_0710FD39
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_05E83AD7 push ebx; retf 9_2_05E83ADA
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_07529CC0 pushad ; retf 10_2_07529D09
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeCode function: 10_2_0C361380 pushfd ; retf 10_2_0C361381
                      Source: New Cmr JV2410180005.exeStatic PE information: section name: .text entropy: 7.77676485066093
                      Source: kOtBoy.exe.0.drStatic PE information: section name: .text entropy: 7.77676485066093
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, eFNPR2j5EMaFkEB3I1.csHigh entropy of concatenated method names: 'ToQ7iP37oO', 'XW07I1dVaJ', 'BsS7cHSU8r', 'knl7tjtBSb', 'OS27EWTj9y', 'lXhcNeVP23', 'KrNc4Qag1u', 'FNlcGAseG1', 'q2ecTD5w9t', 'U5EcwH4OlS'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, MJjgHDK9738lOHXcKD.csHigh entropy of concatenated method names: 'ygdIv2Hei3', 'SUlISrtJCG', 'T5wIXrdBPM', 'WLGIeC2a76', 'XmPIN0p7Ui', 'Gy9I42Zdws', 'rAxIGMnjTn', 'NCEITspVlF', 'Al5IwUC72v', 'vJxIlvMsqx'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, YO2MvRvqj39bjgFy4q.csHigh entropy of concatenated method names: 'j1LngTfZLp', 'OSVnBgmF1l', 'cvnnvEft5b', 'ynvnSBTBwa', 'L2hnCXAc52', 'YPcnZjlul7', 'NvMnmZJlsW', 'VZXnpG9Wkv', 'RoCn84blPF', 'bNlnQ39A6w'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, zGv5qVTkptrjWgecXP.csHigh entropy of concatenated method names: 'H8wJbxuhyc', 'na3JIFWavZ', 's9cJopJALU', 'g5jJcNtU3G', 'lUoJ7PaWpp', 'qnfJtW45mJ', 'kdwJEnOKCL', 'LmdJ6kRwvt', 'v96JML20gj', 'r0EJWLD4BP'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, nokE1ffyTXwoRITMn7.csHigh entropy of concatenated method names: 'vTUc16ACrh', 'vUNcyY9WH4', 'PYEoZ96KEX', 'y8iomR3t9H', 'gsEopGBs2o', 'x5Po8xdwOZ', 'ElooQWhaPo', 'etYodGJEoa', 'xBeo9K74ty', 'QtYogkkDRY'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cpfSwtuydTZ3ThPSY3.csHigh entropy of concatenated method names: 'QrTohAFi1O', 'MpkoYej1VM', 'U9NoKGOgaF', 'eyiouyEQ7W', 'wtEonumupL', 'cS8o0iNCns', 'LOLo5hU2xe', 'Bh3oJNKmHe', 'eN9o2ItVUx', 'vq2ormta0m'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, gsIJ1uAqQVb9Bsovn82.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'QyRrvpHdth', 'zs4rSij49l', 'KefrXA9ZCc', 'B9UrekVSoi', 'CoIrNnXFMq', 'u68r4xS2Lt', 'Hk3rGmtOOy'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, cf615UEWMrVo5fLfIW.csHigh entropy of concatenated method names: 'ugwqi6Hd4M', 'IKuqb6fj1x', 'kCmqI3mUcg', 'QY6qox385k', 'fZfqcBTZVV', 'dsOq7kxOLy', 't89qtcTGNw', 'KvpqEFLwve', 'eVDq63WHAk', 'oOnqMYQ9wO'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, qaLuCFISuOWf4sQIca.csHigh entropy of concatenated method names: 'Dispose', 'qHbAwvMabM', 'O0KUCHBfN9', 'k4W33fJ2Ua', 'zkGAlv5qVk', 'JtrAzjWgec', 'ProcessDialogKey', 'SP6UHKT2UJ', 'H0EUAUcPKX', 'UKRUUItSIE'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, koBgmPAHvs0KHO8OEOB.csHigh entropy of concatenated method names: 'cf72x6NkZJ', 'K6a2aANbn4', 'QCC2komlCS', 'iCo2hmGIQx', 'LOR214ySvG', 'mO72YZqcAx', 'dXH2yoZTxF', 'kyO2KTtxKA', 'O6d2uUuM9h', 'WnP2ftOEfM'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, DkgmBcFrkGyEelcNnw.csHigh entropy of concatenated method names: 'vjdAtJjgHD', 'M73AE8lOHX', 'jydAMTZ3Th', 'wSYAW3WokE', 'gTMAnn7FFN', 'vR2A05EMaF', 'TjiQvrbxXtwc6wFi6F', 'XZrTfAB6eVi779HELN', 'IKkAA0BdJO', 'XwmAqj5G8P'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, CbwD4A9JZ4fuHvHuHp.csHigh entropy of concatenated method names: 'MFNtx3PruF', 'Enhta6Cffe', 'MLetkRL0wk', 'Ybwthd7uXg', 'FGjt13ds6p', 'b3stY64d2Z', 'E7ctySaFQB', 'zPytKJno0L', 'EIxtu6qGpC', 'vdFtfxRVGI'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, lqK1viLKjbL4eMGCsS.csHigh entropy of concatenated method names: 'p0GOKIn5CP', 'NRfOuMpbbF', 'uCtOj6hRHn', 'suYOCbvu43', 'WuoOmCEqD2', 'lbGOpwmc4N', 'zHdOQKHP66', 'QoDOdLoAxH', 'iA1OgWN0en', 'nt5OskQGqD'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, kYb5wJU3l9uYqIuhgi.csHigh entropy of concatenated method names: 'Haikr7HWQ', 'yplhANE5i', 'qHKYk4QNG', 'VykyrlnCy', 'pEZuZdbrK', 'ehkfMdweQ', 'dLNWqDnF4iDrlwrG5B', 'qCKenFjYvgMJQXXEvM', 'VaWJk1Hci', 'bTNrOeO5Y'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, z7vW504WEp44NqOsIU.csHigh entropy of concatenated method names: 'v9W5TFYFlV', 'zoV5lBhG4h', 'cpeJHrnEMF', 'YDtJATEQP8', 'vv45sRkKmr', 'lkN5BUAX6P', 'Uh05LncTNx', 'VWe5vPf6wu', 'NV65SGbScA', 'p3m5XYjAVW'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, lKT2UJwC0EUcPKXNKR.csHigh entropy of concatenated method names: 'jrqJj3WFFv', 'MbsJCprXei', 'ksdJZ8VbuP', 'nymJm50NxQ', 'BALJv6yHc4', 'z38JpRtFse', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, rTkPuQXaTJcqj5kZIM.csHigh entropy of concatenated method names: 'ToString', 'eIn0s7bZ0e', 'QQw0Cc1BHR', 'dH50ZjpYUs', 'hMc0mxPSKt', 'rC70pkY38k', 'MGT08Dyd9T', 'y9o0QE487N', 'hWj0dIJuy1', 'fpY09anTRN'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, gtSIEplje3IpBiA8Rf.csHigh entropy of concatenated method names: 'nRK2AldVKe', 'AGS2q9lgPU', 'AsG2FtkX5P', 'cEo2bVMSql', 'VwD2IkMTGA', 'Lav2cLoCjH', 'Hd827h7c0e', 's3cJGRcPKB', 'wlYJTs5Tsu', 'WFqJwDymTM'
                      Source: 0.2.New Cmr JV2410180005.exe.41a2958.0.raw.unpack, oyCfG1o3MeUfMO0kAE.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'BKyUwKNXMU', 'iH6UlCob65', 'osaUzCxiKH', 'TPdqHR8JW8', 'wKYqAUcXYY', 'wCsqUh5lK7', 'MArqq2whT9', 'fQZ3dJhCRDJLPIKqf9q'
                      Source: 0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
                      Source: 0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, eFNPR2j5EMaFkEB3I1.csHigh entropy of concatenated method names: 'ToQ7iP37oO', 'XW07I1dVaJ', 'BsS7cHSU8r', 'knl7tjtBSb', 'OS27EWTj9y', 'lXhcNeVP23', 'KrNc4Qag1u', 'FNlcGAseG1', 'q2ecTD5w9t', 'U5EcwH4OlS'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, MJjgHDK9738lOHXcKD.csHigh entropy of concatenated method names: 'ygdIv2Hei3', 'SUlISrtJCG', 'T5wIXrdBPM', 'WLGIeC2a76', 'XmPIN0p7Ui', 'Gy9I42Zdws', 'rAxIGMnjTn', 'NCEITspVlF', 'Al5IwUC72v', 'vJxIlvMsqx'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, YO2MvRvqj39bjgFy4q.csHigh entropy of concatenated method names: 'j1LngTfZLp', 'OSVnBgmF1l', 'cvnnvEft5b', 'ynvnSBTBwa', 'L2hnCXAc52', 'YPcnZjlul7', 'NvMnmZJlsW', 'VZXnpG9Wkv', 'RoCn84blPF', 'bNlnQ39A6w'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, zGv5qVTkptrjWgecXP.csHigh entropy of concatenated method names: 'H8wJbxuhyc', 'na3JIFWavZ', 's9cJopJALU', 'g5jJcNtU3G', 'lUoJ7PaWpp', 'qnfJtW45mJ', 'kdwJEnOKCL', 'LmdJ6kRwvt', 'v96JML20gj', 'r0EJWLD4BP'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, nokE1ffyTXwoRITMn7.csHigh entropy of concatenated method names: 'vTUc16ACrh', 'vUNcyY9WH4', 'PYEoZ96KEX', 'y8iomR3t9H', 'gsEopGBs2o', 'x5Po8xdwOZ', 'ElooQWhaPo', 'etYodGJEoa', 'xBeo9K74ty', 'QtYogkkDRY'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cpfSwtuydTZ3ThPSY3.csHigh entropy of concatenated method names: 'QrTohAFi1O', 'MpkoYej1VM', 'U9NoKGOgaF', 'eyiouyEQ7W', 'wtEonumupL', 'cS8o0iNCns', 'LOLo5hU2xe', 'Bh3oJNKmHe', 'eN9o2ItVUx', 'vq2ormta0m'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, gsIJ1uAqQVb9Bsovn82.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'QyRrvpHdth', 'zs4rSij49l', 'KefrXA9ZCc', 'B9UrekVSoi', 'CoIrNnXFMq', 'u68r4xS2Lt', 'Hk3rGmtOOy'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, cf615UEWMrVo5fLfIW.csHigh entropy of concatenated method names: 'ugwqi6Hd4M', 'IKuqb6fj1x', 'kCmqI3mUcg', 'QY6qox385k', 'fZfqcBTZVV', 'dsOq7kxOLy', 't89qtcTGNw', 'KvpqEFLwve', 'eVDq63WHAk', 'oOnqMYQ9wO'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, qaLuCFISuOWf4sQIca.csHigh entropy of concatenated method names: 'Dispose', 'qHbAwvMabM', 'O0KUCHBfN9', 'k4W33fJ2Ua', 'zkGAlv5qVk', 'JtrAzjWgec', 'ProcessDialogKey', 'SP6UHKT2UJ', 'H0EUAUcPKX', 'UKRUUItSIE'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, koBgmPAHvs0KHO8OEOB.csHigh entropy of concatenated method names: 'cf72x6NkZJ', 'K6a2aANbn4', 'QCC2komlCS', 'iCo2hmGIQx', 'LOR214ySvG', 'mO72YZqcAx', 'dXH2yoZTxF', 'kyO2KTtxKA', 'O6d2uUuM9h', 'WnP2ftOEfM'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, DkgmBcFrkGyEelcNnw.csHigh entropy of concatenated method names: 'vjdAtJjgHD', 'M73AE8lOHX', 'jydAMTZ3Th', 'wSYAW3WokE', 'gTMAnn7FFN', 'vR2A05EMaF', 'TjiQvrbxXtwc6wFi6F', 'XZrTfAB6eVi779HELN', 'IKkAA0BdJO', 'XwmAqj5G8P'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, CbwD4A9JZ4fuHvHuHp.csHigh entropy of concatenated method names: 'MFNtx3PruF', 'Enhta6Cffe', 'MLetkRL0wk', 'Ybwthd7uXg', 'FGjt13ds6p', 'b3stY64d2Z', 'E7ctySaFQB', 'zPytKJno0L', 'EIxtu6qGpC', 'vdFtfxRVGI'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, lqK1viLKjbL4eMGCsS.csHigh entropy of concatenated method names: 'p0GOKIn5CP', 'NRfOuMpbbF', 'uCtOj6hRHn', 'suYOCbvu43', 'WuoOmCEqD2', 'lbGOpwmc4N', 'zHdOQKHP66', 'QoDOdLoAxH', 'iA1OgWN0en', 'nt5OskQGqD'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, kYb5wJU3l9uYqIuhgi.csHigh entropy of concatenated method names: 'Haikr7HWQ', 'yplhANE5i', 'qHKYk4QNG', 'VykyrlnCy', 'pEZuZdbrK', 'ehkfMdweQ', 'dLNWqDnF4iDrlwrG5B', 'qCKenFjYvgMJQXXEvM', 'VaWJk1Hci', 'bTNrOeO5Y'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, z7vW504WEp44NqOsIU.csHigh entropy of concatenated method names: 'v9W5TFYFlV', 'zoV5lBhG4h', 'cpeJHrnEMF', 'YDtJATEQP8', 'vv45sRkKmr', 'lkN5BUAX6P', 'Uh05LncTNx', 'VWe5vPf6wu', 'NV65SGbScA', 'p3m5XYjAVW'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, lKT2UJwC0EUcPKXNKR.csHigh entropy of concatenated method names: 'jrqJj3WFFv', 'MbsJCprXei', 'ksdJZ8VbuP', 'nymJm50NxQ', 'BALJv6yHc4', 'z38JpRtFse', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, rTkPuQXaTJcqj5kZIM.csHigh entropy of concatenated method names: 'ToString', 'eIn0s7bZ0e', 'QQw0Cc1BHR', 'dH50ZjpYUs', 'hMc0mxPSKt', 'rC70pkY38k', 'MGT08Dyd9T', 'y9o0QE487N', 'hWj0dIJuy1', 'fpY09anTRN'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, gtSIEplje3IpBiA8Rf.csHigh entropy of concatenated method names: 'nRK2AldVKe', 'AGS2q9lgPU', 'AsG2FtkX5P', 'cEo2bVMSql', 'VwD2IkMTGA', 'Lav2cLoCjH', 'Hd827h7c0e', 's3cJGRcPKB', 'wlYJTs5Tsu', 'WFqJwDymTM'
                      Source: 0.2.New Cmr JV2410180005.exe.9810000.4.raw.unpack, oyCfG1o3MeUfMO0kAE.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'BKyUwKNXMU', 'iH6UlCob65', 'osaUzCxiKH', 'TPdqHR8JW8', 'wKYqAUcXYY', 'wCsqUh5lK7', 'MArqq2whT9', 'fQZ3dJhCRDJLPIKqf9q'
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeFile created: C:\Users\user\AppData\Roaming\kOtBoy.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: New Cmr JV2410180005.exe PID: 7044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: kOtBoy.exe PID: 7256, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: 4ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: 99D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: A9D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: AC00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: BC00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: 9390000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: A390000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: A5A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: B5A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7569Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2144Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7287Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2301Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2493Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1355
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8513
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exe TID: 7124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4856Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3164Thread sleep count: 7287 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1344Thread sleep count: 2301 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1196Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exe TID: 7288Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99871Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99750Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99516Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99404Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99292Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99172Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99062Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98953Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98844Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98723Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98594Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98469Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98250Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98141Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98030Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97921Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97813Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97688Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97578Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99873
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99765
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99437
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99328
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99206
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99078
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98968
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98857
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98635
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98530
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98422
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98203
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98094
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97969
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97859
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97750
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97641
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97531
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97422
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97312
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97203
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97094
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96984
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96875
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96765
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96656
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96546
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96437
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96326
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96217
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96109
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95891
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95772
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95672
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95562
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95453
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95344
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95234
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95125
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95015
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94906
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94797
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94687
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94578
                      Source: kOtBoy.exe, 0000000A.00000002.1940265315.00000000014C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: RegSvcs.exe, 00000009.00000002.1947103283.0000000005F80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlll
                      Source: RegSvcs.exe, 00000012.00000002.2997265799.0000000005E33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: BD7008Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43C000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: AE2008Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Users\user\Desktop\New Cmr JV2410180005.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeQueries volume information: C:\Users\user\AppData\Roaming\kOtBoy.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\kOtBoy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\Desktop\New Cmr JV2410180005.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.1941337532.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2989084655.0000000002C4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2989084655.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1941337532.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: New Cmr JV2410180005.exe PID: 7044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7728, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.70c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1886513393.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1941337532.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: New Cmr JV2410180005.exe PID: 7044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7728, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.4126538.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000002.1941337532.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2989084655.0000000002C4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.2989084655.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.1941337532.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: New Cmr JV2410180005.exe PID: 7044, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7236, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7728, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.70c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.70c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1886513393.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.New Cmr JV2410180005.exe.3ed9970.2.raw.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      Scheduled Task/Job
                      311
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      211
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      11
                      Disable or Modify Tools
                      1
                      Input Capture
                      1
                      Process Discovery
                      Remote Desktop Protocol1
                      Input Capture
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      141
                      Virtualization/Sandbox Evasion
                      1
                      Credentials in Registry
                      141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares11
                      Archive Collected Data
                      11
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object Model2
                      Data from Local System
                      Protocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1541686 Sample: New Cmr JV2410180005.exe Startdate: 25/10/2024 Architecture: WINDOWS Score: 100 48 mail.iaa-airferight.com 2->48 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 15 other signatures 2->58 8 New Cmr JV2410180005.exe 7 2->8         started        12 kOtBoy.exe 5 2->12         started        signatures3 process4 file5 40 C:\Users\user\AppData\Roaming\kOtBoy.exe, PE32 8->40 dropped 42 C:\Users\user\...\kOtBoy.exe:Zone.Identifier, ASCII 8->42 dropped 44 C:\Users\user\AppData\Local\...\tmp5941.tmp, XML 8->44 dropped 46 C:\Users\...46ew Cmr JV2410180005.exe.log, ASCII 8->46 dropped 60 Writes to foreign memory regions 8->60 62 Allocates memory in foreign processes 8->62 64 Adds a directory exclusion to Windows Defender 8->64 14 RegSvcs.exe 2 8->14         started        18 powershell.exe 22 8->18         started        20 powershell.exe 23 8->20         started        28 2 other processes 8->28 66 Multi AV Scanner detection for dropped file 12->66 68 Machine Learning detection for dropped file 12->68 70 Injects a PE file into a foreign processes 12->70 22 RegSvcs.exe 12->22         started        24 schtasks.exe 12->24         started        26 RegSvcs.exe 12->26         started        signatures6 process7 dnsIp8 50 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->50 72 Loading BitLocker PowerShell Module 18->72 30 conhost.exe 18->30         started        32 WmiPrvSE.exe 18->32         started        34 conhost.exe 20->34         started        74 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->74 76 Tries to steal Mail credentials (via file / registry access) 22->76 78 Tries to harvest and steal ftp login credentials 22->78 80 Tries to harvest and steal browser information (history, passwords, etc) 22->80 36 conhost.exe 24->36         started        82 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 28->82 38 conhost.exe 28->38         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      New Cmr JV2410180005.exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      New Cmr JV2410180005.exe34%VirustotalBrowse
                      New Cmr JV2410180005.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\kOtBoy.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\kOtBoy.exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.iaa-airferight.com7%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://www.fontbureau.com0%URL Reputationsafe
                      http://www.fontbureau.com/designersG0%URL Reputationsafe
                      http://www.fontbureau.com/designers/?0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      https://account.dyn.com/0%URL Reputationsafe
                      http://www.fontbureau.com/designers?0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.fontbureau.com/designers0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.fontbureau.com/designers80%URL Reputationsafe
                      http://www.fontbureau.com/designers80%URL Reputationsafe
                      http://www.fonts.com0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.apache.org/licenses/LICENSE-2.00%VirustotalBrowse
                      http://mail.iaa-airferight.com7%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.iaa-airferight.com
                      46.175.148.58
                      truetrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.apache.org/licenses/LICENSE-2.0New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://www.fontbureau.comNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersGNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/?New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/bTheNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/New Cmr JV2410180005.exe, 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://mail.iaa-airferight.comRegSvcs.exe, 00000009.00000002.1941337532.0000000002CD6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000012.00000002.2989084655.0000000002C56000.00000004.00000800.00020000.00000000.sdmptrueunknown
                      http://www.tiro.comNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.goodfont.co.krNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.carterandcone.comlNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sajatypeworks.comNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.typography.netDNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/cabarga.htmlNNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cn/cTheNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/staff/dennis.htmNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.founder.com.cn/cnNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/frere-user.htmlNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.galapagosdesign.com/DPleaseNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers8New Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fonts.comNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sandoll.co.krNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.urwpp.deDPleaseNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.zhongyicts.com.cnNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNew Cmr JV2410180005.exe, 00000000.00000002.1882214707.0000000002F36000.00000004.00000800.00020000.00000000.sdmp, kOtBoy.exe, 0000000A.00000002.1946742054.00000000030E6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.sakkal.comNew Cmr JV2410180005.exe, 00000000.00000002.1886710527.0000000007142000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      46.175.148.58
                      mail.iaa-airferight.comUkraine
                      56394ASLAGIDKOM-NETUAtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1541686
                      Start date and time:2024-10-25 02:00:08 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 7m 6s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:New Cmr JV2410180005.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@23/15@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 167
                      • Number of non-executed functions: 11
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      01:01:19Task SchedulerRun new task: kOtBoy path: C:\Users\user\AppData\Roaming\kOtBoy.exe
                      20:01:11API Interceptor1x Sleep call for process: New Cmr JV2410180005.exe modified
                      20:01:16API Interceptor87x Sleep call for process: powershell.exe modified
                      20:01:22API Interceptor211x Sleep call for process: RegSvcs.exe modified
                      20:01:24API Interceptor1x Sleep call for process: kOtBoy.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      46.175.148.58PO F1298-24 Fabric Order.exeGet hashmaliciousAgentTeslaBrowse
                        PO F1298-24 Fabric Order.zipGet hashmaliciousAgentTeslaBrowse
                          PO 316347 24MIA00660067.exeGet hashmaliciousAgentTeslaBrowse
                            Purchase Order For Linear Actuator.exeGet hashmaliciousAgentTeslaBrowse
                              PO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                                  SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                    New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                      SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                        rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          mail.iaa-airferight.comPO F1298-24 Fabric Order.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO F1298-24 Fabric Order.zipGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO 316347 24MIA00660067.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          Purchase Order For Linear Actuator.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          • 46.175.148.58
                                          New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ASLAGIDKOM-NETUAPO F1298-24 Fabric Order.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO F1298-24 Fabric Order.zipGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO 316347 24MIA00660067.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          Purchase Order For Linear Actuator.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          PO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          • 46.175.148.58
                                          New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                          • 46.175.148.58
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\New Cmr JV2410180005.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:true
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Users\user\AppData\Roaming\kOtBoy.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1216
                                          Entropy (8bit):5.34331486778365
                                          Encrypted:false
                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                          Malicious:false
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:modified
                                          Size (bytes):2232
                                          Entropy (8bit):5.378486415808052
                                          Encrypted:false
                                          SSDEEP:48:fWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//ZeUyus:fLHxvIIwLgZ2KRHWLOugos
                                          MD5:6DFA5C5C671AE3B12C05C766C69CAB61
                                          SHA1:AC1EDD2AAA653980C8E88DD3C581CDEC2C38DDC3
                                          SHA-256:31F626FB392EF951245AB899BE569F1E276C20119A54A5081B63A371E43B8F92
                                          SHA-512:AAD4C225869DCFD6E9A0F5584B7E1A754D35A4C0E87E6201E9EE87EF5DCF3AD43828599B20A7AF68ECE7D64B6977D3F234AD6674C2D3C7A89EA8C72A90F15DFE
                                          Malicious:false
                                          Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Users\user\Desktop\New Cmr JV2410180005.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1572
                                          Entropy (8bit):5.1044042768308175
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTGv
                                          MD5:3DBCF3749E9AF3768165059BC16EB549
                                          SHA1:A533142A2D245318FC683C902EAFBEE792FB6ED4
                                          SHA-256:94BA6563532C559AAFCC0E73F281A1C2B49A2BB135B9D25A808D5201F985008F
                                          SHA-512:827D71054DA79EE95E270242C22B542218D29F71F323CD6C3EF0477015B34416949092175AF2F042DD56A1F0AF2A6D74E83FA2B5E641B5AE2191CFEBEE789BC7
                                          Malicious:true
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                          Process:C:\Users\user\AppData\Roaming\kOtBoy.exe
                                          File Type:XML 1.0 document, ASCII text
                                          Category:dropped
                                          Size (bytes):1572
                                          Entropy (8bit):5.1044042768308175
                                          Encrypted:false
                                          SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTGv
                                          MD5:3DBCF3749E9AF3768165059BC16EB549
                                          SHA1:A533142A2D245318FC683C902EAFBEE792FB6ED4
                                          SHA-256:94BA6563532C559AAFCC0E73F281A1C2B49A2BB135B9D25A808D5201F985008F
                                          SHA-512:827D71054DA79EE95E270242C22B542218D29F71F323CD6C3EF0477015B34416949092175AF2F042DD56A1F0AF2A6D74E83FA2B5E641B5AE2191CFEBEE789BC7
                                          Malicious:false
                                          Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                          Process:C:\Users\user\Desktop\New Cmr JV2410180005.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):964096
                                          Entropy (8bit):7.487399102020608
                                          Encrypted:false
                                          SSDEEP:24576:OYJW0Qy7IvDjljdCc4P7wCwnFMg+Y1ahxyhwU:zqj1opcGjYq8wU
                                          MD5:ADF34C05ADF9629F38D6388BCEAAD6FD
                                          SHA1:12B9C57576E5B2CA7C3D070E68BADA4F59A659AB
                                          SHA-256:2518788F855F3DD62BE94E01361E96373B1A6D7B86F48E72D3BB899589200F09
                                          SHA-512:7C748E84F37A9727F094DFDBD3ACC351030CF9B0651D37FAF8D3460C6F626B23F85ACC17488FC515A3CD8E2276142634B629F1A06751FE528BB4E234529F02B6
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 71%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0.................. ........@.. ....................................@.................................l...O.......................................T............................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......h:.../......0...li...............................................0..>.........}.....(.......(.....~....o.........,..s!.....o.......(.....*...0..|.........{....o....o.....~....~"...%-.&~!.....>...s....%."...(...+...o.....+ .o.......{....o.....o....o....&..o....-....,..o .....*......D.,p......&..(!....*...0..+.........,..{.......+....,...{....o .......("....*..0............s#...}.....s$...}.....s%...}.....{....o&.....('.....{....(6...o(.....{.... @... ....s)...o*.....{.
                                          Process:C:\Users\user\Desktop\New Cmr JV2410180005.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.487399102020608
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:New Cmr JV2410180005.exe
                                          File size:964'096 bytes
                                          MD5:adf34c05adf9629f38d6388bceaad6fd
                                          SHA1:12b9c57576e5b2ca7c3d070e68bada4f59a659ab
                                          SHA256:2518788f855f3dd62be94e01361e96373b1a6d7b86f48e72d3bb899589200f09
                                          SHA512:7c748e84f37a9727f094dfdbd3acc351030cf9b0651d37faf8d3460c6f626b23f85acc17488fc515a3cd8e2276142634b629f1a06751fe528bb4e234529f02b6
                                          SSDEEP:24576:OYJW0Qy7IvDjljdCc4P7wCwnFMg+Y1ahxyhwU:zqj1opcGjYq8wU
                                          TLSH:7425F0045746C952C9E81B308871E3F84B991EB9BC35C70FEEDABDEF3E729692494190
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0.................. ........@.. ....................................@................................
                                          Icon Hash:71d8d4d6dcd8b24d
                                          Entrypoint:0x4bfbbe
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x67170CBC [Tue Oct 22 02:23:56 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          inc ecx
                                          add byte ptr [ebx+00h], dh
                                          jnc 00007FF5FD0D57B2h
                                          imul eax, dword ptr [eax], 006E0067h
                                          insd
                                          add byte ptr [ebp+00h], ah
                                          outsb
                                          add byte ptr [eax+eax+32h], dh
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbfb6c0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x2d5a4.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xbe8fc0x54.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000xbdbdc0xbdc00da59e22ce897e09949f5bf325b262d39False0.9119987236495388data7.77676485066093IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0xc00000x2d5a40x2d600aaa6f353773216808ac19dcd544aae3dFalse0.34638106921487605data5.631955851710547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0xee0000xc0x200a4f5339d11b9c694461fa42ffb29e8a9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xc02980x57bePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9988870091710444
                                          RT_ICON0xc5a580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.18212468945936353
                                          RT_ICON0xd62800x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.26989173849064535
                                          RT_ICON0xdf7280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.305822550831793
                                          RT_ICON0xe4bb00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.29841757203589986
                                          RT_ICON0xe8dd80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3866182572614108
                                          RT_ICON0xeb3800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.44348030018761725
                                          RT_ICON0xec4280x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5413934426229509
                                          RT_ICON0xecdb00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6365248226950354
                                          RT_GROUP_ICON0xed2180x84data0.7045454545454546
                                          RT_GROUP_ICON0xed29c0x14data1.05
                                          RT_VERSION0xed2b00x2f4data0.44047619047619047
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 25, 2024 02:01:24.189521074 CEST4973625192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:25.182964087 CEST4973625192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:27.733515024 CEST4974125192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:28.745465040 CEST4974125192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:30.745632887 CEST4974125192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:34.745448112 CEST4974125192.168.2.446.175.148.58
                                          Oct 25, 2024 02:01:42.745455027 CEST4974125192.168.2.446.175.148.58
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 25, 2024 02:01:24.138359070 CEST5649353192.168.2.41.1.1.1
                                          Oct 25, 2024 02:01:24.173773050 CEST53564931.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 25, 2024 02:01:24.138359070 CEST192.168.2.41.1.1.10x571eStandard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 25, 2024 02:01:24.173773050 CEST1.1.1.1192.168.2.40x571eNo error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:20:01:04
                                          Start date:24/10/2024
                                          Path:C:\Users\user\Desktop\New Cmr JV2410180005.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\New Cmr JV2410180005.exe"
                                          Imagebase:0xae0000
                                          File size:964'096 bytes
                                          MD5 hash:ADF34C05ADF9629F38D6388BCEAAD6FD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1886513393.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1883270170.0000000003ED9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:20:01:14
                                          Start date:24/10/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\New Cmr JV2410180005.exe"
                                          Imagebase:0xcc0000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:20:01:15
                                          Start date:24/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:20:01:15
                                          Start date:24/10/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\kOtBoy.exe"
                                          Imagebase:0xcc0000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:5
                                          Start time:20:01:16
                                          Start date:24/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:6
                                          Start time:20:01:16
                                          Start date:24/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp5941.tmp"
                                          Imagebase:0x880000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:7
                                          Start time:20:01:17
                                          Start date:24/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:20:01:18
                                          Start date:24/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x780000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:9
                                          Start time:20:01:19
                                          Start date:24/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x8c0000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1941337532.0000000002CCE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1939429311.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.1941337532.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.1941337532.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:true

                                          Target ID:10
                                          Start time:20:01:19
                                          Start date:24/10/2024
                                          Path:C:\Users\user\AppData\Roaming\kOtBoy.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\kOtBoy.exe
                                          Imagebase:0xc80000
                                          File size:964'096 bytes
                                          MD5 hash:ADF34C05ADF9629F38D6388BCEAAD6FD
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 71%, ReversingLabs
                                          Has exited:true

                                          Target ID:14
                                          Start time:20:01:23
                                          Start date:24/10/2024
                                          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                          Imagebase:0x7ff693ab0000
                                          File size:496'640 bytes
                                          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                          Has elevated privileges:true
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:false

                                          Target ID:15
                                          Start time:20:01:25
                                          Start date:24/10/2024
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kOtBoy" /XML "C:\Users\user\AppData\Local\Temp\tmp7C89.tmp"
                                          Imagebase:0x880000
                                          File size:187'904 bytes
                                          MD5 hash:48C2FE20575769DE916F48EF0676A965
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:16
                                          Start time:20:01:25
                                          Start date:24/10/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:17
                                          Start time:20:01:25
                                          Start date:24/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x330000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Has exited:true

                                          Target ID:18
                                          Start time:20:01:25
                                          Start date:24/10/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                          Imagebase:0x840000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.2989084655.0000000002C4E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000012.00000002.2989084655.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.6%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:1.9%
                                            Total number of Nodes:323
                                            Total number of Limit Nodes:22
                                            execution_graph 50481 16b4668 50482 16b467a 50481->50482 50483 16b4686 50482->50483 50487 16b4789 50482->50487 50491 16b4210 50483->50491 50485 16b46a5 50488 16b479d 50487->50488 50495 16b4888 50488->50495 50492 16b421b 50491->50492 50503 16b5e60 50492->50503 50494 16b7791 50494->50485 50497 16b48af 50495->50497 50496 16b498c 50497->50496 50499 16b44d4 50497->50499 50500 16b5918 CreateActCtxA 50499->50500 50502 16b59db 50500->50502 50502->50502 50504 16b5e6b 50503->50504 50507 16b734c 50504->50507 50506 16b7975 50506->50494 50508 16b7357 50507->50508 50511 16b737c 50508->50511 50510 16b7a5a 50510->50506 50512 16b7387 50511->50512 50515 16b73ac 50512->50515 50514 16b7b4d 50514->50510 50516 16b73b7 50515->50516 50518 16b8ccb 50516->50518 50521 16bb379 50516->50521 50517 16b8d09 50517->50514 50518->50517 50525 16bd478 50518->50525 50529 16bb39f 50521->50529 50533 16bb3b0 50521->50533 50522 16bb38e 50522->50518 50526 16bd499 50525->50526 50527 16bd4bd 50526->50527 50541 16bd628 50526->50541 50527->50517 50530 16bb3b0 50529->50530 50536 16bb498 50530->50536 50531 16bb3bf 50531->50522 50535 16bb498 GetModuleHandleW 50533->50535 50534 16bb3bf 50534->50522 50535->50534 50537 16bb4b9 50536->50537 50538 16bb4dc 50536->50538 50537->50538 50539 16bb6e0 GetModuleHandleW 50537->50539 50538->50531 50540 16bb70d 50539->50540 50540->50531 50542 16bd635 50541->50542 50543 16bd66f 50542->50543 50545 16bc1e0 50542->50545 50543->50527 50547 16bc1eb 50545->50547 50546 16be388 50547->50546 50549 16bd9dc 50547->50549 50550 16bd9e7 50549->50550 50551 16b73ac GetModuleHandleW 50550->50551 50552 16be3f7 50551->50552 50552->50546 50606 710dfd3 50607 710ddc6 50606->50607 50607->50606 50608 710e011 50607->50608 50611 cb30773 50607->50611 50627 cb30780 50607->50627 50612 cb30780 50611->50612 50613 cb307a2 50612->50613 50643 cb30e6a 50612->50643 50648 cb31306 50612->50648 50653 cb30b67 50612->50653 50659 cb31462 50612->50659 50663 cb30f43 50612->50663 50667 cb30ca3 50612->50667 50673 cb3121e 50612->50673 50678 cb30e5f 50612->50678 50686 cb30ddf 50612->50686 50691 cb31574 50612->50691 50696 cb311b3 50612->50696 50701 cb3108c 50612->50701 50708 cb30e88 50612->50708 50613->50607 50628 cb3079a 50627->50628 50629 cb307a2 50628->50629 50630 cb311b3 2 API calls 50628->50630 50631 cb31574 2 API calls 50628->50631 50632 cb30ddf 2 API calls 50628->50632 50633 cb30e5f 4 API calls 50628->50633 50634 cb3121e 2 API calls 50628->50634 50635 cb30ca3 2 API calls 50628->50635 50636 cb30f43 2 API calls 50628->50636 50637 cb31462 2 API calls 50628->50637 50638 cb30b67 2 API calls 50628->50638 50639 cb31306 2 API calls 50628->50639 50640 cb30e6a 2 API calls 50628->50640 50641 cb30e88 2 API calls 50628->50641 50642 cb3108c 4 API calls 50628->50642 50629->50607 50630->50629 50631->50629 50632->50629 50633->50629 50634->50629 50635->50629 50636->50629 50637->50629 50638->50629 50639->50629 50640->50629 50641->50629 50642->50629 50644 cb30e70 50643->50644 50645 cb316ca 50644->50645 50713 710d0a3 50644->50713 50717 710d0a8 50644->50717 50649 cb3130c 50648->50649 50650 cb316ca 50649->50650 50651 710d0a3 ResumeThread 50649->50651 50652 710d0a8 ResumeThread 50649->50652 50651->50649 50652->50649 50655 cb30bab 50653->50655 50654 cb30c9d 50654->50613 50655->50654 50721 710d9b0 50655->50721 50725 710d9a5 50655->50725 50729 710d2f0 50659->50729 50733 710d2e8 50659->50733 50660 cb31493 50660->50613 50664 cb30f6e 50663->50664 50665 710d2f0 WriteProcessMemory 50663->50665 50666 710d2e8 WriteProcessMemory 50663->50666 50665->50664 50666->50664 50669 cb30c34 50667->50669 50668 cb30c9d 50668->50613 50669->50668 50671 710d9b0 CreateProcessA 50669->50671 50672 710d9a5 CreateProcessA 50669->50672 50670 cb30d8f 50670->50613 50671->50670 50672->50670 50674 cb31234 50673->50674 50737 710d3e0 50674->50737 50741 710d3d8 50674->50741 50675 cb30dba 50675->50613 50679 cb31351 50678->50679 50745 710d230 50679->50745 50749 710d22b 50679->50749 50680 cb30e07 50681 cb30e2b 50680->50681 50682 710d2f0 WriteProcessMemory 50680->50682 50683 710d2e8 WriteProcessMemory 50680->50683 50681->50613 50682->50681 50683->50681 50687 cb30e07 50686->50687 50689 710d2f0 WriteProcessMemory 50687->50689 50690 710d2e8 WriteProcessMemory 50687->50690 50688 cb30e2b 50688->50613 50689->50688 50690->50688 50692 cb31576 50691->50692 50753 710d150 50692->50753 50757 710d158 50692->50757 50693 cb31591 50697 cb3131d 50696->50697 50698 cb3168f 50697->50698 50699 710d0a3 ResumeThread 50697->50699 50700 710d0a8 ResumeThread 50697->50700 50698->50613 50699->50697 50700->50697 50706 710d150 Wow64SetThreadContext 50701->50706 50707 710d158 Wow64SetThreadContext 50701->50707 50702 cb30e81 50702->50613 50703 cb316ca 50702->50703 50704 710d0a3 ResumeThread 50702->50704 50705 710d0a8 ResumeThread 50702->50705 50704->50702 50705->50702 50706->50702 50707->50702 50709 cb30e91 50708->50709 50711 710d2f0 WriteProcessMemory 50709->50711 50712 710d2e8 WriteProcessMemory 50709->50712 50710 cb30f6e 50711->50710 50712->50710 50714 710d0a8 ResumeThread 50713->50714 50716 710d119 50714->50716 50716->50644 50718 710d0e8 ResumeThread 50717->50718 50720 710d119 50718->50720 50720->50644 50722 710da39 CreateProcessA 50721->50722 50724 710dbfb 50722->50724 50726 710da39 CreateProcessA 50725->50726 50728 710dbfb 50726->50728 50730 710d338 WriteProcessMemory 50729->50730 50732 710d38f 50730->50732 50732->50660 50734 710d2f0 WriteProcessMemory 50733->50734 50736 710d38f 50734->50736 50736->50660 50738 710d42b ReadProcessMemory 50737->50738 50740 710d46f 50738->50740 50740->50675 50742 710d42b ReadProcessMemory 50741->50742 50744 710d46f 50742->50744 50744->50675 50746 710d270 VirtualAllocEx 50745->50746 50748 710d2ad 50746->50748 50748->50680 50750 710d230 VirtualAllocEx 50749->50750 50752 710d2ad 50750->50752 50752->50680 50754 710d158 Wow64SetThreadContext 50753->50754 50756 710d1e5 50754->50756 50756->50693 50758 710d19d Wow64SetThreadContext 50757->50758 50760 710d1e5 50758->50760 50760->50693 50876 cb31ac0 50877 cb31c4b 50876->50877 50878 cb31ae6 50876->50878 50878->50877 50881 cb31d38 50878->50881 50884 cb31d40 PostMessageW 50878->50884 50882 cb31d40 PostMessageW 50881->50882 50883 cb31dac 50882->50883 50883->50878 50885 cb31dac 50884->50885 50885->50878 50553 54c8a68 50554 54c8a69 50553->50554 50557 54c7e5c 50554->50557 50556 54c8a75 50558 54c7e67 50557->50558 50561 16b737c GetModuleHandleW 50558->50561 50562 16b7a98 50558->50562 50559 54c8c0c 50559->50556 50561->50559 50563 16b7adb 50562->50563 50564 16b73ac GetModuleHandleW 50563->50564 50565 16b7b4d 50564->50565 50565->50559 50861 54c5028 50862 54c5050 50861->50862 50863 54c5101 50861->50863 50870 54c5678 DrawTextExW 50862->50870 50871 54c5688 DrawTextExW 50862->50871 50869 54c51d2 50863->50869 50872 54c5678 DrawTextExW 50863->50872 50873 54c5688 DrawTextExW 50863->50873 50864 54c5095 50874 54c4c00 GetSystemMetrics GetSystemMetrics 50864->50874 50866 54c5154 50866->50869 50875 54c4c00 GetSystemMetrics GetSystemMetrics 50866->50875 50867 54c50a0 50870->50864 50871->50864 50872->50866 50873->50866 50874->50867 50875->50869 50886 70f7078 50887 70f7097 50886->50887 50890 70f70ae 50886->50890 50894 70f70b0 50886->50894 50891 70f70b0 50890->50891 50893 70f70e8 DrawTextExW 50891->50893 50892 70f70de 50892->50887 50893->50892 50895 70f70b9 50894->50895 50897 70f70e8 DrawTextExW 50895->50897 50896 70f70de 50896->50887 50897->50896 50566 16bd740 50567 16bd786 GetCurrentProcess 50566->50567 50569 16bd7d8 GetCurrentThread 50567->50569 50570 16bd7d1 50567->50570 50571 16bd80e 50569->50571 50572 16bd815 GetCurrentProcess 50569->50572 50570->50569 50571->50572 50573 16bd84b GetCurrentThreadId 50572->50573 50575 16bd8a4 50573->50575 50898 16bdd90 DuplicateHandle 50899 16bde26 50898->50899 50576 54c8760 50577 54c8761 50576->50577 50580 54c7cbc 50577->50580 50579 54c877f 50581 54c7cc7 50580->50581 50583 16b73ac GetModuleHandleW 50581->50583 50582 54c8804 50582->50579 50583->50582 50584 70f92a0 50585 70f92da 50584->50585 50586 70f936b 50585->50586 50587 70f9356 50585->50587 50588 70f8b90 CreateIconFromResourceEx 50586->50588 50592 70f8b90 50587->50592 50590 70f937a 50588->50590 50593 70f8b9b 50592->50593 50594 70f9361 50593->50594 50597 70f9cb0 50593->50597 50600 70f9cc0 50593->50600 50603 70f8bd8 50597->50603 50601 70f8bd8 CreateIconFromResourceEx 50600->50601 50602 70f9cda 50600->50602 50601->50602 50602->50594 50604 70f9d10 CreateIconFromResourceEx 50603->50604 50605 70f9cda 50604->50605 50605->50594 50761 70fe6c0 50763 70fe6f5 50761->50763 50762 70feb8b 50763->50762 50766 70febc0 50763->50766 50771 70febd0 50763->50771 50767 70febd0 50766->50767 50775 70fec3f 50767->50775 50779 70fec50 50767->50779 50768 70fec0c 50768->50763 50773 70fec3f DrawTextExW 50771->50773 50774 70fec50 DrawTextExW 50771->50774 50772 70fec0c 50772->50763 50773->50772 50774->50772 50776 70fec50 50775->50776 50777 70fec91 50776->50777 50783 70f70e8 50776->50783 50777->50768 50780 70fec73 50779->50780 50781 70fec91 50780->50781 50782 70f70e8 DrawTextExW 50780->50782 50781->50768 50782->50781 50784 70f7122 50783->50784 50785 70f7133 50783->50785 50784->50777 50785->50784 50788 70f7400 50785->50788 50793 70f73f0 50785->50793 50789 70f7428 50788->50789 50790 70f752a 50789->50790 50798 70f7959 50789->50798 50804 70f7968 50789->50804 50790->50784 50794 70f7400 50793->50794 50795 70f752a 50794->50795 50796 70f7959 DrawTextExW 50794->50796 50797 70f7968 DrawTextExW 50794->50797 50795->50784 50796->50795 50797->50795 50799 70f792c 50798->50799 50800 70f7966 50798->50800 50799->50790 50809 70f7ce8 50800->50809 50819 70f7cf8 50800->50819 50801 70f79f4 50801->50790 50805 70f797e 50804->50805 50807 70f7ce8 DrawTextExW 50805->50807 50808 70f7cf8 DrawTextExW 50805->50808 50806 70f79f4 50806->50790 50807->50806 50808->50806 50810 70f7d6a 50809->50810 50811 70f7cf7 50809->50811 50812 70f7d95 50810->50812 50834 54c5678 50810->50834 50839 54c5688 50810->50839 50818 70f7ce8 DrawTextExW 50811->50818 50824 70f7d28 50811->50824 50829 70f7d38 50811->50829 50812->50801 50813 70f7d16 50813->50801 50818->50813 50820 70f7d16 50819->50820 50821 70f7d28 DrawTextExW 50819->50821 50822 70f7d38 DrawTextExW 50819->50822 50823 70f7ce8 DrawTextExW 50819->50823 50820->50801 50821->50820 50822->50820 50823->50820 50825 70f7d38 50824->50825 50826 70f7d95 50825->50826 50827 54c5678 DrawTextExW 50825->50827 50828 54c5688 DrawTextExW 50825->50828 50826->50813 50827->50826 50828->50826 50830 70f7d69 50829->50830 50831 70f7d95 50830->50831 50832 54c5678 DrawTextExW 50830->50832 50833 54c5688 DrawTextExW 50830->50833 50831->50813 50832->50831 50833->50831 50836 54c5680 50834->50836 50835 54c56be 50835->50812 50836->50835 50844 54c41b4 50836->50844 50838 54c5729 50841 54c5689 50839->50841 50840 54c56be 50840->50812 50841->50840 50842 54c41b4 DrawTextExW 50841->50842 50843 54c5729 50842->50843 50846 54c41bf 50844->50846 50845 54c7109 50845->50838 50846->50845 50850 54c8078 50846->50850 50854 54c8088 50846->50854 50847 54c721c 50847->50838 50851 54c8088 50850->50851 50857 54c7c74 50851->50857 50855 54c7c74 DrawTextExW 50854->50855 50856 54c80a5 50855->50856 50856->50847 50858 54c80c0 DrawTextExW 50857->50858 50860 54c80a5 50858->50860 50860->50847

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 527 7100628-7100649 529 7100650-710073c 527->529 530 710064b 527->530 532 7100f61-7100f89 529->532 533 7100742-710088d call 7100590 529->533 530->529 536 7101658-7101661 532->536 579 7100893-71008ee 533->579 580 7100f2e-7100f5f 533->580 537 7100f97-7100fa0 536->537 538 7101667-710167e 536->538 540 7100fa2 537->540 541 7100fa7-7101097 call 7100590 537->541 540->541 561 71010c1 541->561 562 7101099-71010a5 541->562 564 71010c7-71010e7 561->564 565 71010a7-71010ad 562->565 566 71010af-71010b5 562->566 570 7101145-71011bd 564->570 571 71010e9-7101140 564->571 567 71010bf 565->567 566->567 567->564 590 7101212-7101255 call 7100590 570->590 591 71011bf-7101210 570->591 585 7101655 571->585 587 71008f0 579->587 588 71008f3-71008fe 579->588 580->532 585->536 587->588 592 7100e42-7100e48 588->592 618 7101260-7101266 590->618 591->618 593 7100903-7100921 592->593 594 7100e4e-7100ecb 592->594 597 7100923-7100927 593->597 598 7100978-710098d 593->598 636 7100f18-7100f1e 594->636 597->598 604 7100929-7100934 597->604 600 7100994-71009aa 598->600 601 710098f 598->601 607 71009b1-71009c8 600->607 608 71009ac 600->608 601->600 609 710096a-7100970 604->609 613 71009ca 607->613 614 71009cf-71009e5 607->614 608->607 611 7100972-7100973 609->611 612 7100936-710093a 609->612 621 71009f6-7100a67 611->621 616 7100940-7100958 612->616 617 710093c 612->617 613->614 619 71009e7 614->619 620 71009ec-71009f3 614->620 624 710095a 616->624 625 710095f-7100967 616->625 617->616 626 71012bb-71012c7 618->626 619->620 620->621 627 7100a69 621->627 628 7100a7d-7100bf5 621->628 624->625 625->609 630 7101268-710128a 626->630 631 71012c9-710134f 626->631 627->628 629 7100a6b-7100a77 627->629 637 7100bf7 628->637 638 7100c0b-7100d46 628->638 629->628 633 7101291-71012b8 630->633 634 710128c 630->634 658 71014ce-71014d7 631->658 633->626 634->633 640 7100f20-7100f26 636->640 641 7100ecd-7100f15 636->641 637->638 643 7100bf9-7100c05 637->643 650 7100d48-7100d4c 638->650 651 7100daa-7100dbf 638->651 640->580 641->636 643->638 650->651 653 7100d4e-7100d5d 650->653 655 7100dc1 651->655 656 7100dc6-7100de7 651->656 657 7100d9c-7100da2 653->657 655->656 660 7100de9 656->660 661 7100dee-7100e0d 656->661 666 7100da4-7100da5 657->666 667 7100d5f-7100d63 657->667 662 7101354-7101369 658->662 663 71014dd-7101538 658->663 660->661 664 7100e14-7100e34 661->664 665 7100e0f 661->665 670 7101372-71014bc 662->670 671 710136b 662->671 689 710153a-710156d 663->689 690 710156f-7101599 663->690 672 7100e36 664->672 673 7100e3b 664->673 665->664 674 7100e3f 666->674 668 7100d65-7100d69 667->668 669 7100d6d-7100d8e 667->669 668->669 676 7100d90 669->676 677 7100d95-7100d99 669->677 695 71014c8 670->695 671->670 678 7101400-710143e 671->678 679 7101443-7101483 671->679 680 7101378-71013a9 671->680 681 71013bb-71013fb 671->681 672->673 673->674 674->592 676->677 677->657 678->695 679->695 694 71013b5-71013b6 680->694 681->695 698 71015a2-7101649 689->698 690->698 694->695 695->658 698->585
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$TJkq$Tefq$pjq$xbiq
                                            • API String ID: 0-2688501482
                                            • Opcode ID: b2d3335174c9a159ca142976aadcc952b5ff241a7f188ec291e6162aefe166d9
                                            • Instruction ID: f09d0f5d43c3d202dcd76bdf622302cb85e3941e3ca8ea31254e178e0239376a
                                            • Opcode Fuzzy Hash: b2d3335174c9a159ca142976aadcc952b5ff241a7f188ec291e6162aefe166d9
                                            • Instruction Fuzzy Hash: 8AB2C075E00228DFDB64CF69C984ADDBBB2BF89300F1581E9D509AB265DB319E81CF40

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 703 70f8b90-70f93c0 706 70f93c6-70f93cb 703->706 707 70f98a3-70f990c 703->707 706->707 708 70f93d1-70f93ee 706->708 715 70f9913-70f999b 707->715 714 70f93f4-70f93f8 708->714 708->715 716 70f93fa-70f9404 call 70f8ba0 714->716 717 70f9407-70f940b 714->717 760 70f99a6-70f9a26 715->760 716->717 720 70f940d-70f9417 call 70f8ba0 717->720 721 70f941a-70f9421 717->721 720->721 725 70f953c-70f9541 721->725 726 70f9427-70f9457 721->726 730 70f9549-70f954e 725->730 731 70f9543-70f9547 725->731 735 70f945d-70f9530 call 70f8bac * 2 726->735 736 70f9c26-70f9c4c 726->736 734 70f9560-70f9590 call 70f8bb8 * 3 730->734 731->730 733 70f9550-70f9554 731->733 733->736 740 70f955a-70f955d 733->740 734->760 761 70f9596-70f9599 734->761 735->725 768 70f9532 735->768 751 70f9c4e-70f9c5a 736->751 752 70f9c5c 736->752 740->734 757 70f9c5f-70f9c64 751->757 752->757 775 70f9a2d-70f9aaf 760->775 761->760 763 70f959f-70f95a1 761->763 763->760 766 70f95a7-70f95dc 763->766 766->775 776 70f95e2-70f95eb 766->776 768->725 783 70f9ab7-70f9b39 775->783 778 70f974e-70f9752 776->778 779 70f95f1-70f964b call 70f8bb8 * 2 call 70f8bc8 * 2 776->779 782 70f9758-70f975c 778->782 778->783 823 70f965d 779->823 824 70f964d-70f9656 779->824 786 70f9762-70f9768 782->786 787 70f9b41-70f9b6e 782->787 783->787 791 70f976c-70f97a1 786->791 792 70f976a 786->792 799 70f9b75-70f9bf5 787->799 793 70f97a8-70f97ae 791->793 792->793 793->799 800 70f97b4-70f97bc 793->800 856 70f9bfc-70f9c1e 799->856 805 70f97be-70f97c2 800->805 806 70f97c3-70f97c5 800->806 805->806 812 70f9827-70f982d 806->812 813 70f97c7-70f97eb 806->813 818 70f982f-70f984a 812->818 819 70f984c-70f987a 812->819 841 70f97ed-70f97f2 813->841 842 70f97f4-70f97f8 813->842 839 70f9882-70f988e 818->839 819->839 829 70f9661-70f9663 823->829 828 70f9658-70f965b 824->828 824->829 828->829 837 70f966a-70f966e 829->837 838 70f9665 829->838 843 70f967c-70f9682 837->843 844 70f9670-70f9677 837->844 838->837 839->856 857 70f9894-70f98a0 839->857 848 70f9804-70f9815 841->848 842->736 849 70f97fe-70f9801 842->849 845 70f968c-70f9691 843->845 846 70f9684-70f968a 843->846 853 70f9719-70f971d 844->853 854 70f9697-70f969d 845->854 846->854 893 70f9817 call 70f9cb0 848->893 894 70f9817 call 70f9cc0 848->894 849->848 858 70f971f-70f9739 853->858 859 70f973c-70f9748 853->859 861 70f969f-70f96a1 854->861 862 70f96a3-70f96a8 854->862 856->736 858->859 859->778 859->779 868 70f96aa-70f96bc 861->868 862->868 865 70f981d-70f9825 865->839 874 70f96be-70f96c4 868->874 875 70f96c6-70f96cb 868->875 876 70f96d1-70f96d8 874->876 875->876 881 70f96de 876->881 882 70f96da-70f96dc 876->882 883 70f96e3-70f96ee 881->883 882->883 885 70f9712 883->885 886 70f96f0-70f96f3 883->886 885->853 886->853 888 70f96f5-70f96fb 886->888 889 70f96fd-70f9700 888->889 890 70f9702-70f970b 888->890 889->885 889->890 890->853 892 70f970d-70f9710 890->892 892->853 892->885 893->865 894->865
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Hjq$Hjq$Hjq$Hjq$Hjq
                                            • API String ID: 0-1529018591
                                            • Opcode ID: 95eabe13422c98afa2280cc0dd9e9a4cddf9cbd04f943e98e46aab6a29a5b1ce
                                            • Instruction ID: cc330377332115dadc3eb3b91b011f39055616c258f16a6590ca503d1045569c
                                            • Opcode Fuzzy Hash: 95eabe13422c98afa2280cc0dd9e9a4cddf9cbd04f943e98e46aab6a29a5b1ce
                                            • Instruction Fuzzy Hash: 29327EB1E102188FDB54DFA8C85079EBBF2BF84300F1485AAD549EB395DA34AD45CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1889603212.000000000CB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CB30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cb30000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: P&^
                                            • API String ID: 0-2339185298
                                            • Opcode ID: 3c1eac968df6aed4d18487325a4f6021ff39b871c47e1d93f4f652dd46552af8
                                            • Instruction ID: 87d17a30cade996bffdc6a14e1406775bffee93ec226a3408b08a990b44e628f
                                            • Opcode Fuzzy Hash: 3c1eac968df6aed4d18487325a4f6021ff39b871c47e1d93f4f652dd46552af8
                                            • Instruction Fuzzy Hash: A19128B4E05228CBDB68DF66D8407EDBBB6BF89300F1491EAD40DA6240EB705AC5CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 01cd1a3eceae8bfa958fb3c4643c2c0465d07eb30f43ce25caf50db61b2423c0
                                            • Instruction ID: 242c7cc08a2b27ec6895461e88d36ca3e6282e0813cacceefb0ee5f1838ab841
                                            • Opcode Fuzzy Hash: 01cd1a3eceae8bfa958fb3c4643c2c0465d07eb30f43ce25caf50db61b2423c0
                                            • Instruction Fuzzy Hash: 42D1F9B4D15228CFDB24DFA5C8447DEBBB2FF4A300F1085AAD529AB280D7B44985CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3ae489e93c2b36547474f1320fc6cfc3973fb76463d056d456a0012ad2877c40
                                            • Instruction ID: cf293b7cc848ab951133929e5a69f1b829a2f57af379b23b63f33d3a44f2c62f
                                            • Opcode Fuzzy Hash: 3ae489e93c2b36547474f1320fc6cfc3973fb76463d056d456a0012ad2877c40
                                            • Instruction Fuzzy Hash: B3D1E8B4D15228CFDB24DFA5C8487DEBBB2FF49300F1085AAD529AB280D7B45985CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f944affcdce1a687db362580cdd059752a69df7d671bdf9194d445cfbe16e04
                                            • Instruction ID: e9c38b907051932a3b530e63518cbfb5f97d0b5d52ea70f84c8242a7a8a390d4
                                            • Opcode Fuzzy Hash: 9f944affcdce1a687db362580cdd059752a69df7d671bdf9194d445cfbe16e04
                                            • Instruction Fuzzy Hash: E8C16CB1E10219CFCF54CFA9C88079DBBF2AF89310F14C2AAD549AB655DB30A985CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f5c0913ae58455b60ce63e7cc0ffe1eca6c4a5b68cddb10cf1f255d7a5fc7f8e
                                            • Instruction ID: 73dc0a3a59cf14de30168814f4d608c4245060c8dd8c4c4ad3efc00eb2921f42
                                            • Opcode Fuzzy Hash: f5c0913ae58455b60ce63e7cc0ffe1eca6c4a5b68cddb10cf1f255d7a5fc7f8e
                                            • Instruction Fuzzy Hash: 0631F533A00B18CFE312D61796059827BD9DFBA330B15D2AEC1182F1F2D668A580EF85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2346872ec01d8f4b3fe1e6055b480bcd18c13abe012356db5c9c23971f7acb3c
                                            • Instruction ID: 23831cb6e438d0f913f4bdaae8accf423676a7f23b2996994d242680a0257de3
                                            • Opcode Fuzzy Hash: 2346872ec01d8f4b3fe1e6055b480bcd18c13abe012356db5c9c23971f7acb3c
                                            • Instruction Fuzzy Hash: 452116B0D186198BDB08CF67C9443EEBFF6BFC9310F04C06AD409A6294DB7409458F90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 488f4bf3ce99800714e13d166a9ebaab0205519c99f99e0b5b34db1534f8010b
                                            • Instruction ID: 63471b66c96cc29f337a13797d1876f77a1fd73ffda8eb8cc5b59c4557d2963c
                                            • Opcode Fuzzy Hash: 488f4bf3ce99800714e13d166a9ebaab0205519c99f99e0b5b34db1534f8010b
                                            • Instruction Fuzzy Hash: 5321C7B0D186198BDB18CFABC9443EEFAF6AFC9310F04C06AD40976294DBB509458F91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1004 16bd740-16bd7cf GetCurrentProcess 1008 16bd7d8-16bd80c GetCurrentThread 1004->1008 1009 16bd7d1-16bd7d7 1004->1009 1010 16bd80e-16bd814 1008->1010 1011 16bd815-16bd849 GetCurrentProcess 1008->1011 1009->1008 1010->1011 1013 16bd84b-16bd851 1011->1013 1014 16bd852-16bd86a 1011->1014 1013->1014 1017 16bd873-16bd8a2 GetCurrentThreadId 1014->1017 1018 16bd8ab-16bd90d 1017->1018 1019 16bd8a4-16bd8aa 1017->1019 1019->1018
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 016BD7BE
                                            • GetCurrentThread.KERNEL32 ref: 016BD7FB
                                            • GetCurrentProcess.KERNEL32 ref: 016BD838
                                            • GetCurrentThreadId.KERNEL32 ref: 016BD891
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 25c1f2cc48555d8fa135030db20ce71109861203849d0fc99c395ade94bf6711
                                            • Instruction ID: c1dc38206b5fdb17ae4ddc02dbcf0718a94a3f6c14e3264b6f991b6d4d3591fc
                                            • Opcode Fuzzy Hash: 25c1f2cc48555d8fa135030db20ce71109861203849d0fc99c395ade94bf6711
                                            • Instruction Fuzzy Hash: 5A5155B0D002498FDB14DFAAD988BDEBBF5AF88318F248459E119A7360D7346984CF61

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1048 710d9a5-710da45 1050 710da47-710da51 1048->1050 1051 710da7e-710da9e 1048->1051 1050->1051 1052 710da53-710da55 1050->1052 1058 710daa0-710daaa 1051->1058 1059 710dad7-710db06 1051->1059 1053 710da57-710da61 1052->1053 1054 710da78-710da7b 1052->1054 1056 710da63 1053->1056 1057 710da65-710da74 1053->1057 1054->1051 1056->1057 1057->1057 1061 710da76 1057->1061 1058->1059 1060 710daac-710daae 1058->1060 1067 710db08-710db12 1059->1067 1068 710db3f-710dbf9 CreateProcessA 1059->1068 1062 710dab0-710daba 1060->1062 1063 710dad1-710dad4 1060->1063 1061->1054 1065 710dabc 1062->1065 1066 710dabe-710dacd 1062->1066 1063->1059 1065->1066 1066->1066 1069 710dacf 1066->1069 1067->1068 1070 710db14-710db16 1067->1070 1079 710dc02-710dc88 1068->1079 1080 710dbfb-710dc01 1068->1080 1069->1063 1072 710db18-710db22 1070->1072 1073 710db39-710db3c 1070->1073 1074 710db24 1072->1074 1075 710db26-710db35 1072->1075 1073->1068 1074->1075 1075->1075 1077 710db37 1075->1077 1077->1073 1090 710dc98-710dc9c 1079->1090 1091 710dc8a-710dc8e 1079->1091 1080->1079 1093 710dcac-710dcb0 1090->1093 1094 710dc9e-710dca2 1090->1094 1091->1090 1092 710dc90 1091->1092 1092->1090 1096 710dcc0-710dcc4 1093->1096 1097 710dcb2-710dcb6 1093->1097 1094->1093 1095 710dca4 1094->1095 1095->1093 1099 710dcd6-710dcdd 1096->1099 1100 710dcc6-710dccc 1096->1100 1097->1096 1098 710dcb8 1097->1098 1098->1096 1101 710dcf4 1099->1101 1102 710dcdf-710dcee 1099->1102 1100->1099 1104 710dcf5 1101->1104 1102->1101 1104->1104
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0710DBE6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID: P&^
                                            • API String ID: 963392458-2339185298
                                            • Opcode ID: 12ed96bee8b8a8e76bdfb9936ac33f74a7edd8439b7504e5939af70109944cd5
                                            • Instruction ID: 4d9f979f86a740ebca905bed19e7c56c176418aad633eb53b2d86c42de4eece3
                                            • Opcode Fuzzy Hash: 12ed96bee8b8a8e76bdfb9936ac33f74a7edd8439b7504e5939af70109944cd5
                                            • Instruction Fuzzy Hash: AEA16DB1E0021ADFDF25DFA8D9417EDBBB2BF48310F148169D849A7280DBB49985CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1105 710d9b0-710da45 1107 710da47-710da51 1105->1107 1108 710da7e-710da9e 1105->1108 1107->1108 1109 710da53-710da55 1107->1109 1115 710daa0-710daaa 1108->1115 1116 710dad7-710db06 1108->1116 1110 710da57-710da61 1109->1110 1111 710da78-710da7b 1109->1111 1113 710da63 1110->1113 1114 710da65-710da74 1110->1114 1111->1108 1113->1114 1114->1114 1118 710da76 1114->1118 1115->1116 1117 710daac-710daae 1115->1117 1124 710db08-710db12 1116->1124 1125 710db3f-710dbf9 CreateProcessA 1116->1125 1119 710dab0-710daba 1117->1119 1120 710dad1-710dad4 1117->1120 1118->1111 1122 710dabc 1119->1122 1123 710dabe-710dacd 1119->1123 1120->1116 1122->1123 1123->1123 1126 710dacf 1123->1126 1124->1125 1127 710db14-710db16 1124->1127 1136 710dc02-710dc88 1125->1136 1137 710dbfb-710dc01 1125->1137 1126->1120 1129 710db18-710db22 1127->1129 1130 710db39-710db3c 1127->1130 1131 710db24 1129->1131 1132 710db26-710db35 1129->1132 1130->1125 1131->1132 1132->1132 1134 710db37 1132->1134 1134->1130 1147 710dc98-710dc9c 1136->1147 1148 710dc8a-710dc8e 1136->1148 1137->1136 1150 710dcac-710dcb0 1147->1150 1151 710dc9e-710dca2 1147->1151 1148->1147 1149 710dc90 1148->1149 1149->1147 1153 710dcc0-710dcc4 1150->1153 1154 710dcb2-710dcb6 1150->1154 1151->1150 1152 710dca4 1151->1152 1152->1150 1156 710dcd6-710dcdd 1153->1156 1157 710dcc6-710dccc 1153->1157 1154->1153 1155 710dcb8 1154->1155 1155->1153 1158 710dcf4 1156->1158 1159 710dcdf-710dcee 1156->1159 1157->1156 1161 710dcf5 1158->1161 1159->1158 1161->1161
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0710DBE6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID: P&^
                                            • API String ID: 963392458-2339185298
                                            • Opcode ID: 92b919e6bacd8aab0253a65c7810372211f2aac36f38105b44033839527ca2b9
                                            • Instruction ID: 592e4e42b3c14ba917681ccb08dc49c58c2d4cc049252e3ed2b2e3c46196078f
                                            • Opcode Fuzzy Hash: 92b919e6bacd8aab0253a65c7810372211f2aac36f38105b44033839527ca2b9
                                            • Instruction Fuzzy Hash: 46917DB1E0021ADFDF25DFA8D9417DDBBB2BF48310F148169D849A7280DBB49985CF91
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 016BB6FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 9e06fff1edcb8171de90a31931cc6168d8d00abc5eb05f0fdbe58898f80c7637
                                            • Instruction ID: f8b036d5c53626417beffabfc143d0288760334c0d21471b1fbcf5ab482ad965
                                            • Opcode Fuzzy Hash: 9e06fff1edcb8171de90a31931cc6168d8d00abc5eb05f0fdbe58898f80c7637
                                            • Instruction Fuzzy Hash: D68114B0A00B458FD725DF69D89479ABBF1BF48300F048A2DD08ADBB51D775E885CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0435fc078481a7f6184478aa4c44b5e91e7e7af0016f99c6677ff475b5e26e8f
                                            • Instruction ID: 6d6b3f70fdf25128741503a74f38dc92324021dfc9fe595b60213edd03ece270
                                            • Opcode Fuzzy Hash: 0435fc078481a7f6184478aa4c44b5e91e7e7af0016f99c6677ff475b5e26e8f
                                            • Instruction Fuzzy Hash: 7341CF71805388CECB21DFA8CCC56EEBBB1EF46324F14818AC407AB255C7356A86CF51
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 016B59C9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 577ada4d5fe627b1c2ae9ae1f49628b31eae9ee4e7fc33839898854822012ff8
                                            • Instruction ID: ac3ea0e07b9d80259511a0adbef68c4f75d1eef81988e7e27a26dea57004f2bc
                                            • Opcode Fuzzy Hash: 577ada4d5fe627b1c2ae9ae1f49628b31eae9ee4e7fc33839898854822012ff8
                                            • Instruction Fuzzy Hash: 8641C2B0C0071DCBDB25DFA9C984BDEBBB6BF49304F20805AD509AB251DB756985CF90
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0710D380
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: c42c5954846465614927f854d99123916cfa7bdaccb8710c1bcf56a5904b79ff
                                            • Instruction ID: 9219b7a877fe79cc203709fb0e659d86e3c9b158c605e7a8f67934e73ca52e20
                                            • Opcode Fuzzy Hash: c42c5954846465614927f854d99123916cfa7bdaccb8710c1bcf56a5904b79ff
                                            • Instruction Fuzzy Hash: 552128B59003499FDF10CFA9C981BDEBBF5FF48320F108429E959A7240D7789944DBA1
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,054C80A5,?,?), ref: 054C8157
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1885342485.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_54c0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: bad305be13adaccf5341020acb7fddecd58969c09b277e873c1d3fc63a91164a
                                            • Instruction ID: d2a0c5790da9b6860e0341c1b5280a130fcbfebd86380fa4d522815f68e9eacf
                                            • Opcode Fuzzy Hash: bad305be13adaccf5341020acb7fddecd58969c09b277e873c1d3fc63a91164a
                                            • Instruction Fuzzy Hash: 0431E2B59002099FDB10CF9AD884ADEBBF5FF48320F14846EE819A7310D774A944CFA0
                                            APIs
                                            • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,054C80A5,?,?), ref: 054C8157
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1885342485.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_54c0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: DrawText
                                            • String ID:
                                            • API String ID: 2175133113-0
                                            • Opcode ID: 5afccfc4e67e4c98bf34c214b663e7f6c01fb58ae28b0379753794ecca363249
                                            • Instruction ID: 393a23720c01447f0e7889a553e66ae96760330fc0fc5ab770f63880cd3c853b
                                            • Opcode Fuzzy Hash: 5afccfc4e67e4c98bf34c214b663e7f6c01fb58ae28b0379753794ecca363249
                                            • Instruction Fuzzy Hash: 8B31BFB59002499FDB10CF9AD880ADEBBF5FB48320F24846AE819A7310D775A944CFA0
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0710D380
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 83b5797e0318602768b8270f1fe06b8b42f604645d6d0553e996d1d1a921a6a1
                                            • Instruction ID: c01f69d2764b33aed586b070cda4b6878322a4f52c8d897f1fdde9c509df9380
                                            • Opcode Fuzzy Hash: 83b5797e0318602768b8270f1fe06b8b42f604645d6d0553e996d1d1a921a6a1
                                            • Instruction Fuzzy Hash: DD2127B59003499FDB10CFA9C881BDEBBF5FF48320F10842AE959A7280C7789944DBA0
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0710D1D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 5aa8e3f61e1ac365be4eda5e9e891523097baffdfcb415d49d9cb36d181b1557
                                            • Instruction ID: 4ff9e48456284deab0f0f9a983d79d9f791e21c8e226026b53c3826162b07763
                                            • Opcode Fuzzy Hash: 5aa8e3f61e1ac365be4eda5e9e891523097baffdfcb415d49d9cb36d181b1557
                                            • Instruction Fuzzy Hash: F92139B1D002098FDB10DFAAC9857AEBBF5EF48320F148429D559A7381CBB89545CFA1
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0710D460
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 0dff2d52e5052849f15a95642481c450c97f32ac7f43dfd80d12622e1865b51d
                                            • Instruction ID: 6931676f9764625d70c71a648ca76bfac679a2f9e7816350066d2086d7d6fee1
                                            • Opcode Fuzzy Hash: 0dff2d52e5052849f15a95642481c450c97f32ac7f43dfd80d12622e1865b51d
                                            • Instruction Fuzzy Hash: 382148B1D003499FCB10CFAAC881ADEFBF5FF48320F10842AE959A7240D7789900DBA1
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0710D460
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 6103d83ef5b577c2c0ef5b71518e49cebeee6bc2d4c363ea3b93ecb79b691e29
                                            • Instruction ID: 6ad00192a8a6e7c3930ea8905cef379ddb0e78ef1b4930eb9a7cb45aa0fe9420
                                            • Opcode Fuzzy Hash: 6103d83ef5b577c2c0ef5b71518e49cebeee6bc2d4c363ea3b93ecb79b691e29
                                            • Instruction Fuzzy Hash: 182128B1D003499FDB10DFAAC881ADEBBF5FF48320F10842AE559A7240C778A544DBA1
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0710D1D6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 6451f68c1411c7cdb0d6a53a85957fc7ea97ae74307a04b2cf2cb4ed4ee25b56
                                            • Instruction ID: d22e69266543528bd733bf93effe0619248dc8edacce0cbd016c560b30a86700
                                            • Opcode Fuzzy Hash: 6451f68c1411c7cdb0d6a53a85957fc7ea97ae74307a04b2cf2cb4ed4ee25b56
                                            • Instruction Fuzzy Hash: 70211AB1D003098FDB10DFAAC5857AEBBF5EF48324F148429D559A7380DB789544CFA1
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 016BDE17
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: adecae7aba1083cce7554dc5bc828a1f005019e4a4d48b5d98bee56ef6e719fe
                                            • Instruction ID: e5f221ec88f84eb9164e33dc5e146ac66c2d74a22abde3067e24cd6d3b4dfdb6
                                            • Opcode Fuzzy Hash: adecae7aba1083cce7554dc5bc828a1f005019e4a4d48b5d98bee56ef6e719fe
                                            • Instruction Fuzzy Hash: 9F21E4B59002499FDB10CF9AD984ADEBFF9EF48324F14841AE918A7310D374A954CFA0
                                            APIs
                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,070F9CDA,?,?,?,?,?), ref: 070F9D7F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: CreateFromIconResource
                                            • String ID:
                                            • API String ID: 3668623891-0
                                            • Opcode ID: cd08377a24319379d0d5db5562918c19c5ac5760c7fb7262d8e015e91d9d31e4
                                            • Instruction ID: 158a5cf8828923bd3209aa9bbc79fd26fa87e2ef4add2f6cf7438fb90666774f
                                            • Opcode Fuzzy Hash: cd08377a24319379d0d5db5562918c19c5ac5760c7fb7262d8e015e91d9d31e4
                                            • Instruction Fuzzy Hash: 751137B58003499FDB10DF9AC844BDEBFF8EF48320F24841AE918A7210C375A954DFA4
                                            APIs
                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,070F9CDA,?,?,?,?,?), ref: 070F9D7F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: CreateFromIconResource
                                            • String ID:
                                            • API String ID: 3668623891-0
                                            • Opcode ID: 6ab6c83608833d019bfdb676f2510ff335eeef11a5bae867be4ac8c726c90e98
                                            • Instruction ID: 6ba698e1cf394c2599d063c51fb41ac888dfced239d5de785104f8ce2a820f04
                                            • Opcode Fuzzy Hash: 6ab6c83608833d019bfdb676f2510ff335eeef11a5bae867be4ac8c726c90e98
                                            • Instruction Fuzzy Hash: 9D1137B68003499FDB10DF99C945BDEBFF8EF48320F24841AE518A7210C375A554DFA4
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0710D29E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: d0c3a9b056ea303a7238e6b66475ee8f455a9dee24028c47d397f6e92928270d
                                            • Instruction ID: 39bd40df7bcbe0a3f6f7dd96b7161183df5cbdf973094aa09fcff8e4a76acf99
                                            • Opcode Fuzzy Hash: d0c3a9b056ea303a7238e6b66475ee8f455a9dee24028c47d397f6e92928270d
                                            • Instruction Fuzzy Hash: F91167B29002499FCF10DFAAC845BDEBFF5EF88320F248419E519A7250C775A944DFA1
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0710D29E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 4f7ec8468b3ae7e876ea099e76f8d7038c202f183c3d9b317f0ad26a23edba70
                                            • Instruction ID: 39b8d1458358d8d36b1fd05167cf3c6266c526c7d44abf3ce9716cd2caa07491
                                            • Opcode Fuzzy Hash: 4f7ec8468b3ae7e876ea099e76f8d7038c202f183c3d9b317f0ad26a23edba70
                                            • Instruction Fuzzy Hash: 111167B19002499FCB10DFAAC845ADEBFF5EF88320F208419E519A7250C775A540DFA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 7374689ce02488e8cc21fed47cb9b39a8d477ed0dfc90f89fc4f6c7e949a6869
                                            • Instruction ID: 199c4c3cb72fde0492cc281306abda55be129f0819a774fad23980934f036f20
                                            • Opcode Fuzzy Hash: 7374689ce02488e8cc21fed47cb9b39a8d477ed0dfc90f89fc4f6c7e949a6869
                                            • Instruction Fuzzy Hash: 831128B19003498FDB20DFAAC8457DEFBF9EF88324F248419D519A7340CB79A544CBA5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 11fe9c2c137cfa348ca6c2219d25d356a1254251d1c7a075645445402d1eb322
                                            • Instruction ID: b79fd870904db9ab13d4451daf738dd3b551df50c5a99aee3047d629ba378f29
                                            • Opcode Fuzzy Hash: 11fe9c2c137cfa348ca6c2219d25d356a1254251d1c7a075645445402d1eb322
                                            • Instruction Fuzzy Hash: 1B1128B19002498FDB20DFAAC44579EFBF5EF88324F248419D519A7240CB79A544CBA5
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 0CB31D9D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1889603212.000000000CB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CB30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cb30000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 1461171c04c959207836495ec8e9b467cc74da6276fb19d547ae5eabfe482238
                                            • Instruction ID: 4b7e576ad83bcbfd07c92c5bc4054af88780373c33072f00af84ad19cf7123b7
                                            • Opcode Fuzzy Hash: 1461171c04c959207836495ec8e9b467cc74da6276fb19d547ae5eabfe482238
                                            • Instruction Fuzzy Hash: EF11F2B58003499FDB10DF9AC985BDEBBF8EB48320F20845AE918A7600C375A944CFA1
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 016BB6FE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 2d98e7b0ea7fbd6aa6c13590b7639082113a23ef507beb91baf865c4913e42d2
                                            • Instruction ID: 545e7fc4c97525741b3b50042f04929c23f0494e03558bcc20a72ad8992221ec
                                            • Opcode Fuzzy Hash: 2d98e7b0ea7fbd6aa6c13590b7639082113a23ef507beb91baf865c4913e42d2
                                            • Instruction Fuzzy Hash: 7B11E0B5C006498FDB10CF9AC884ADEFBF5EF88324F24842AD529A7710D379A545CFA1
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 0CB31D9D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1889603212.000000000CB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CB30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cb30000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: a899a9a2933a25293608ac232644c241ba783bd20f19ebe1624aaf2f13538aab
                                            • Instruction ID: e36783bb332621ccf2ae93e77df1e9009553445af869a5e35fc89687f716d59e
                                            • Opcode Fuzzy Hash: a899a9a2933a25293608ac232644c241ba783bd20f19ebe1624aaf2f13538aab
                                            • Instruction Fuzzy Hash: 241103B58003499FDB10DF9AC985BDEBBF8EB48320F20845AD518A7200C375A544CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880135681.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_106d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3b05235d4dfbedf0ec08f5502378bb081fc4cef975d16990e92fb88f48c8844
                                            • Instruction ID: ca3cbb4737be074b1664e583228ffefd4aaf8f6fc97653b27355fb7f1542eb03
                                            • Opcode Fuzzy Hash: e3b05235d4dfbedf0ec08f5502378bb081fc4cef975d16990e92fb88f48c8844
                                            • Instruction Fuzzy Hash: 0E212BB1604201DFDF05DF94D9C0B2ABFA9FB94324F24C5A9ED850B246C336D456CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880184656.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_107d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1c89d5cb5642aa6067e8ef705df3509da826ab210dc78305fbf54a14efbbc600
                                            • Instruction ID: ff63b5a19a4336c6b92dc1efafdf8a05bd298c5b7372f536620b5f87a8044e75
                                            • Opcode Fuzzy Hash: 1c89d5cb5642aa6067e8ef705df3509da826ab210dc78305fbf54a14efbbc600
                                            • Instruction Fuzzy Hash: ED2129B1A04200EFDB05DF98D5C0B26BBA5FF94324F24C5ADE9894B252C336D447CB65
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880184656.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_107d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b43bfb510e4f2745f489fc73fcf51cfc959c4581cba3edb994903cc11ed208a2
                                            • Instruction ID: 92fba61d2b14f3e032e07ffa235250e32c8ecb54a3673b538c7624d1be29a729
                                            • Opcode Fuzzy Hash: b43bfb510e4f2745f489fc73fcf51cfc959c4581cba3edb994903cc11ed208a2
                                            • Instruction Fuzzy Hash: 792125B5A04200DFCB16DF58D9C0B26BBA5FF84354F24C9ADE98A4B246C336D407CBA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880184656.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_107d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e29a7374dd05c3090169890d38a09763e62a4df668ae7e7a4eeb621f25970ea
                                            • Instruction ID: 742f939f5aacdbee79f4e7270ba5a49a2bc4db4694cd1ed4b7aa08ca4c6a8be8
                                            • Opcode Fuzzy Hash: 2e29a7374dd05c3090169890d38a09763e62a4df668ae7e7a4eeb621f25970ea
                                            • Instruction Fuzzy Hash: CC2183755093808FD713CF64D590715BFB1EF46214F28C5DAD8898B667C33A980ACBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880135681.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_106d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                                            • Instruction ID: 245cdb55950cdf7647915b982c9132307beb75eb95f29dfcf35a9675edeabcc9
                                            • Opcode Fuzzy Hash: 0198dffcca54c8a327979ca184e18e1179e26769679eb7287e54d642110c921c
                                            • Instruction Fuzzy Hash: 9121E176504240CFDB16CF44D9C4B16BFB2FB84324F24C1AADD880B656C33AD46ACBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880184656.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_107d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                            • Instruction ID: 99c8d633d645dfb543d26857fb5d97a9e35301936361e249cff352b47b403982
                                            • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                            • Instruction Fuzzy Hash: F611BB75904280DFDB12CF54C5C0B15BFA2FF84224F28C6AAD8894B696C33AD44BCB61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880135681.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_106d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b37561ef4ad8983cd234dca297018fa6eaab692e9a7a8621ed03ff085f4015d3
                                            • Instruction ID: 7ebd9cb1f2c85e35a0b1cfe3dbde93b9795bed61c76b21e5d26bceceb24f738b
                                            • Opcode Fuzzy Hash: b37561ef4ad8983cd234dca297018fa6eaab692e9a7a8621ed03ff085f4015d3
                                            • Instruction Fuzzy Hash: 4A01F7712043809AE7109EA9CDC4B6ABFDCEF41324F18C55AEDC94A282E67D9840C772
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1880135681.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_106d000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2514f49213277c697f7f60c3f00e73fd7d92913079ef1e2864f7fcbbc879cbb4
                                            • Instruction ID: 7c9aaea125b457064b8d9a02b60ffc65423c7a17ee805d1e99d9d064b64dd2de
                                            • Opcode Fuzzy Hash: 2514f49213277c697f7f60c3f00e73fd7d92913079ef1e2864f7fcbbc879cbb4
                                            • Instruction Fuzzy Hash: B0F0C2715043809EE7118E1AD8C4B66FFDCEF41634F18C05AED884A286D2799844CBB1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TJkq$Tefq$xbiq
                                            • API String ID: 0-2501753584
                                            • Opcode ID: 8e088476724c2e4dbb66e4c15919388073ee7bf67068550f6ca03ce7ee645561
                                            • Instruction ID: dfaa33dc0cc50cfccc463cd2013d29f69dbabd9515b86c6110ac15f9f21c7d59
                                            • Opcode Fuzzy Hash: 8e088476724c2e4dbb66e4c15919388073ee7bf67068550f6ca03ce7ee645561
                                            • Instruction Fuzzy Hash: 31B1A3B5E006288FDB18DF6AC9846DDBBF2BF88301F14C1A9D809AB354DB305A85CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq
                                            • API String ID: 0-2007657732
                                            • Opcode ID: 3360217162da9126cf739d8bae77a74e8cf20437b8935e9108d0d540e3228e74
                                            • Instruction ID: 1c22867974a7039f0dd832a336ce38a6b431e11f1d69ac1e59bf85e8900ba8ea
                                            • Opcode Fuzzy Hash: 3360217162da9126cf739d8bae77a74e8cf20437b8935e9108d0d540e3228e74
                                            • Instruction Fuzzy Hash: 9F613EB0A152198FD748EF7AE84569E7FF2FB88301F14C529E015AB264EF701945DB81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq
                                            • API String ID: 0-2007657732
                                            • Opcode ID: 8c7dc06fbc63c6a8490b537df570468f32a413bc903cb07688841509b90039ec
                                            • Instruction ID: 20cd78df8fb35ec402134b49cdf379c826581c7b366d20a9d273dd64fe83c6ab
                                            • Opcode Fuzzy Hash: 8c7dc06fbc63c6a8490b537df570468f32a413bc903cb07688841509b90039ec
                                            • Instruction Fuzzy Hash: AB612BB0A152198FD748EF7AE88569E7FF2FB88300F14C529E014AB268EF705945DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1889603212.000000000CB30000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CB30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_cb30000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4016ad3594ce9e0f17df4485888024d12a80226177fcc0dc1052d72ac9ff5231
                                            • Instruction ID: 36a27ac9a9b8794131fd52355da72a14e214ad157ec437345e4878c1cfb11dd3
                                            • Opcode Fuzzy Hash: 4016ad3594ce9e0f17df4485888024d12a80226177fcc0dc1052d72ac9ff5231
                                            • Instruction Fuzzy Hash: 26E18D717016059FDB25DBB9C8907AFB7F7AF89200F2484ADD0459B3A1DB35E842CB52
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5647d446e0905b91a8208a0b08116e9ba33fa314fe26d22c3e29ca20b2c7a84a
                                            • Instruction ID: 47004b1a7b4a91a0fb97deab3ab4f17a024d353679574d1ec6148b5f923976d2
                                            • Opcode Fuzzy Hash: 5647d446e0905b91a8208a0b08116e9ba33fa314fe26d22c3e29ca20b2c7a84a
                                            • Instruction Fuzzy Hash: C8E12BB4E051198FDB14DFA9C9909AEFBB2FF89300F24C169D814AB395D771A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72499c09e35eb1a6c8070693683612741241fbea05e572c254ddb20aa07911b1
                                            • Instruction ID: 30576ce3aeb8fad842f3e5c9b3275b260ed3b732fc088acf037b2623b50ddfc8
                                            • Opcode Fuzzy Hash: 72499c09e35eb1a6c8070693683612741241fbea05e572c254ddb20aa07911b1
                                            • Instruction Fuzzy Hash: BAE13CB4E001198FDB14DFA9D5809AEFBB2FF89304F24C16AD854AB395C771A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0aab1aaeba5bfd91f9eeebe4f106af8c63855200cb34ac825fe02e4eb0ae2a37
                                            • Instruction ID: 1814464fb10c72d0d62d9a2488a48bc3c4d06b3f03cbe25748ef6bbed86f73e9
                                            • Opcode Fuzzy Hash: 0aab1aaeba5bfd91f9eeebe4f106af8c63855200cb34ac825fe02e4eb0ae2a37
                                            • Instruction Fuzzy Hash: CBE11CB4E051198FDB14DFA9C9909AEFBB2FF49304F24C169D814AB395C771A942CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 60bd3a3e880e8dd99fc1ab4132781b6d438255555de77639415b916078198883
                                            • Instruction ID: 3f33bdc5a8868dd7dd59e86739e987a99a9157f0d79f387635d626fd18d818a0
                                            • Opcode Fuzzy Hash: 60bd3a3e880e8dd99fc1ab4132781b6d438255555de77639415b916078198883
                                            • Instruction Fuzzy Hash: 95E12CB4E052198FDB14DFA9C5909AEFBB2FF89300F24C16AD414AB395D771A941CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1881708881.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_16b0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c0f90268dc5d3721def36108c49e63c1d532fd85b93f9f117948f7fe3fe06301
                                            • Instruction ID: 288d626cf181304d2d2ddc6174ccc855b853959fceb3e7c1101bbf7b92734192
                                            • Opcode Fuzzy Hash: c0f90268dc5d3721def36108c49e63c1d532fd85b93f9f117948f7fe3fe06301
                                            • Instruction Fuzzy Hash: 70A15032E102159FCF05DFB8CC805EEBBB6FF85300B1545AAE905AB265DB71E995CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886634355.0000000007100000.00000040.00000800.00020000.00000000.sdmp, Offset: 07100000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_7100000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 374eb708133b963ab120b03f953400b437b5a0f52577c4bb6d4dab4ab9de2f5f
                                            • Instruction ID: a1e301c59a7a1e90219f045911347ec75deb696e517f5b23e7eb6b424d67cea1
                                            • Opcode Fuzzy Hash: 374eb708133b963ab120b03f953400b437b5a0f52577c4bb6d4dab4ab9de2f5f
                                            • Instruction Fuzzy Hash: 66513BB5E002198FDB14DFA9D9805AEFBF2BF89304F24C169D858A7355D7319942CFA0
                                            APIs
                                            • GetSystemMetrics.USER32(00000022), ref: 070F5AAE
                                            • GetSystemMetrics.USER32(00000023), ref: 070F5AE8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1886598212.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_70f0000_New Cmr JV2410180005.jbxd
                                            Similarity
                                            • API ID: MetricsSystem
                                            • String ID: <
                                            • API String ID: 4116985748-4251816714
                                            • Opcode ID: 3804bc74820a933dc9be818a45b31b04dc85701c94bea6f427711e253903c5c1
                                            • Instruction ID: 7a9c3c4319871f2334fcbcb31781cc07e482a35e0d16df842f76951043dda3b7
                                            • Opcode Fuzzy Hash: 3804bc74820a933dc9be818a45b31b04dc85701c94bea6f427711e253903c5c1
                                            • Instruction Fuzzy Hash: 902136B1C04349CEDB22CF99C94A79ABFF4AF08314F24845AD159A7780C3B85584CFA1

                                            Execution Graph

                                            Execution Coverage:11.7%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:3
                                            Total number of Limit Nodes:0
                                            execution_graph 25166 5e8e288 25167 5e8e2ce GlobalMemoryStatusEx 25166->25167 25168 5e8e2fe 25167->25168
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8a7f12d7213444133b889c9ad8a5e5212dd0e90f476a2a950ac8ee01fe83f5a2
                                            • Instruction ID: 304e3a997b8c04c4ca0d6432753ced5b92c4a8ac0661a7b23b8331c733006ae9
                                            • Opcode Fuzzy Hash: 8a7f12d7213444133b889c9ad8a5e5212dd0e90f476a2a950ac8ee01fe83f5a2
                                            • Instruction Fuzzy Hash: DA53F631D10B1A8ADB11EF68C8905A9F7B1FF99300F51D79AE458B7125FB70AAC4CB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c4ddeda22f86ba92b62c5b31b5a1699a743be1c6e4c101acddb09abe86b4d220
                                            • Instruction ID: 3394f4f09e2e4c5511e8c901e058adf0ad4a5bef2cc8831377a81a324ea85b77
                                            • Opcode Fuzzy Hash: c4ddeda22f86ba92b62c5b31b5a1699a743be1c6e4c101acddb09abe86b4d220
                                            • Instruction Fuzzy Hash: B3333031D107198EDB11DFA8C8906ADF7B1FF99300F14C79AE458A7265EB70AAC5CB41
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5859b61c79fa7cc2a4ce2e385ce9a37102b8efb0f14b5caf21ec73c7e152e512
                                            • Instruction ID: b9f2daec2ce915b771bf6e675f11af93e551b20df39fda4d0f5e133a31f2bee7
                                            • Opcode Fuzzy Hash: 5859b61c79fa7cc2a4ce2e385ce9a37102b8efb0f14b5caf21ec73c7e152e512
                                            • Instruction Fuzzy Hash: B6B17E70E00209DFDF11CFADD9A17ADBBF2AF88318F148129D915E7294EB749985CB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0037fbc71f25c66dbac352af03082c2e31217e824973ea19b520c3587c543bca
                                            • Instruction ID: 21f60fbebaab9d8a22a2ad80130d80ff20a80881a1e17890540355478f796c18
                                            • Opcode Fuzzy Hash: 0037fbc71f25c66dbac352af03082c2e31217e824973ea19b520c3587c543bca
                                            • Instruction Fuzzy Hash: 2A917C70E00209CFDF15CFA9C9957AEBBF2BF98318F148129E514E7294EB749985CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2284 1306ee8-1306f42 call 1306c40 2293 1306f44-1306f5d call 1306774 2284->2293 2294 1306f5e-1306f8c 2284->2294 2298 1306f8e-1306f91 2294->2298 2300 1306f93-1306fc8 2298->2300 2301 1306fcd-1306fd0 2298->2301 2300->2301 2302 1306fe0-1306fe3 2301->2302 2303 1306fd2 2301->2303 2304 1306fe5-1306ff9 2302->2304 2305 1307016-1307019 2302->2305 2326 1306fd2 call 13080f1 2303->2326 2327 1306fd2 call 1307908 2303->2327 2315 1306ffb-1306ffd 2304->2315 2316 1306fff 2304->2316 2306 130701b-1307022 2305->2306 2307 130702d-130702f 2305->2307 2309 1307028 2306->2309 2310 13070eb-13070f1 2306->2310 2311 1307031 2307->2311 2312 1307036-1307039 2307->2312 2308 1306fd8-1306fdb 2308->2302 2309->2307 2311->2312 2312->2298 2314 130703f-130704e 2312->2314 2320 1307050-1307053 2314->2320 2321 1307078-130708d 2314->2321 2317 1307002-1307011 2315->2317 2316->2317 2317->2305 2323 130705b-1307076 2320->2323 2321->2310 2323->2320 2323->2321 2326->2308 2327->2308
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq$LRfq
                                            • API String ID: 0-2141892265
                                            • Opcode ID: 4f309e066f2ba6e6abc8aa7e5886c4a3cf8d7dad6ea77a7de2e4bdd3949bf7ab
                                            • Instruction ID: 4b3d2baae4e9d3baa1abd93fe5f618229a8b45c399b38ee0f2e54e0c6274fec8
                                            • Opcode Fuzzy Hash: 4f309e066f2ba6e6abc8aa7e5886c4a3cf8d7dad6ea77a7de2e4bdd3949bf7ab
                                            • Instruction Fuzzy Hash: 1041C170B002099FDB16DFA8C46179EB7F6EF86314F10856AE405EB294EB71AC46CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2947 5e8e288-5e8e2fc GlobalMemoryStatusEx 2949 5e8e2fe-5e8e304 2947->2949 2950 5e8e305-5e8e32d 2947->2950 2949->2950
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE ref: 05E8E2EF
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1946958181.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_5e80000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 32a4867ebced03b2b47d9c2f8c71ca93389c2c4c59bdb226f191ab24b4a866c4
                                            • Instruction ID: 4d3f0ac57f6f130bbeac21ab6be1d2764a8d94e63681aa6d980e7c49485da884
                                            • Opcode Fuzzy Hash: 32a4867ebced03b2b47d9c2f8c71ca93389c2c4c59bdb226f191ab24b4a866c4
                                            • Instruction Fuzzy Hash: 941114B1C002599BDB10DF9AC545B9EFBF8BF48320F14816AE918A7240D378A944CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2953 5e8e287-5e8e2c6 2954 5e8e2ce-5e8e2fc GlobalMemoryStatusEx 2953->2954 2955 5e8e2fe-5e8e304 2954->2955 2956 5e8e305-5e8e32d 2954->2956 2955->2956
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE ref: 05E8E2EF
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1946958181.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_5e80000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: c97cc76bc444294570766f7461dfeb44adf9343e71c7bd4051e90ffc5e0153bd
                                            • Instruction ID: 83f57f3cb233bd056e238914fb71fed696486819c3bd6e668e34273cf0c0ec12
                                            • Opcode Fuzzy Hash: c97cc76bc444294570766f7461dfeb44adf9343e71c7bd4051e90ffc5e0153bd
                                            • Instruction Fuzzy Hash: AD1126B1C002599BDB10CF9AC5457EEFBF4BF08320F14815AD518B7240D378A944CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHfq
                                            • API String ID: 0-2154135885
                                            • Opcode ID: 6f927f9b7a14baf2ec3d157cec7e39c829a45a8447dd9cf28357fdad7069a2f7
                                            • Instruction ID: 91a6cb248d54b271f7f0eaec7711677b25e14ff4d2ad86540abb5a0c6cad2e80
                                            • Opcode Fuzzy Hash: 6f927f9b7a14baf2ec3d157cec7e39c829a45a8447dd9cf28357fdad7069a2f7
                                            • Instruction Fuzzy Hash: 0031F270B002058FDB2AAB78D56476F7BF6AF89254F144478D406EB38ADE35DC418B90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq
                                            • API String ID: 0-2333822924
                                            • Opcode ID: 1d2164afb011a0ff0cdf2c0e821b25deeefeda39d989b878a15534721179c11c
                                            • Instruction ID: c46090accbc916e7ebca16a3eee6e54688425bc977943b0fa806d412e899adbe
                                            • Opcode Fuzzy Hash: 1d2164afb011a0ff0cdf2c0e821b25deeefeda39d989b878a15534721179c11c
                                            • Instruction Fuzzy Hash: 7C11DDB17041025FC715EBBDD4607AF7BAAEF86340F4285AAE049CB3E8EE319C418791
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq
                                            • API String ID: 0-2333822924
                                            • Opcode ID: 076ee65e53313a384266adb6d831ffb38bd32c5cae1a1d14befbcb59b24b96bb
                                            • Instruction ID: c8186454030c4cf71b3318dfa0bfebdf1068aa3fe3461d5f460a671c9810f8e2
                                            • Opcode Fuzzy Hash: 076ee65e53313a384266adb6d831ffb38bd32c5cae1a1d14befbcb59b24b96bb
                                            • Instruction Fuzzy Hash: B101D4B2B001119BD705ABB8D46469E7BE6EFCA701F1184AAD10ACB3D4EE7588418791
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e04c15ec0a0d9bb602b52c2f085b7d35bab5670f96d8e79c1df039e7b1e4da67
                                            • Instruction ID: 016ada40dff7f4d59b2353903ae32e0dc610c63f39adbd07e407b8e4e5b60387
                                            • Opcode Fuzzy Hash: e04c15ec0a0d9bb602b52c2f085b7d35bab5670f96d8e79c1df039e7b1e4da67
                                            • Instruction Fuzzy Hash: EB1262307001028FCB2AAB7CD8A965D76E2FBC9248B505D2DE485CB399CF71ED46DB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: feeb090a9906a7d2e115fdf93b9d8a72014b70c03b42f1c5694874668fa1ceb3
                                            • Instruction ID: a151fa56b94c831395f21c20f8afe9250425e3029de35a6f04923183d9a54ae4
                                            • Opcode Fuzzy Hash: feeb090a9906a7d2e115fdf93b9d8a72014b70c03b42f1c5694874668fa1ceb3
                                            • Instruction Fuzzy Hash: 2DE16235B001158FDB16DF68D994B6EBBF2EF88318F148469E50AEB3A6DA35DC41CB40
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd0c94e43707353a11eb8c88090fda6a11c0a989b499b0aa6051ca57c1ef7a3f
                                            • Instruction ID: 0fef178cfd6d0085f970d7cc27af6e1992669beae74d5bb39edbccbf8dea84bb
                                            • Opcode Fuzzy Hash: dd0c94e43707353a11eb8c88090fda6a11c0a989b499b0aa6051ca57c1ef7a3f
                                            • Instruction Fuzzy Hash: 26C1AE75A002058FEB15CFADD9907AEBBF5FB88318F108569E509EB396D770D841CB90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec8bc29be19e5ebb0ed0de6773ba573ceccdc899d90b94ac7a4f4e2815ecb3fc
                                            • Instruction ID: 9b61e70960e9be3316a4f38e01cb387a0614a8eac834a0e8392cf1d39b36e208
                                            • Opcode Fuzzy Hash: ec8bc29be19e5ebb0ed0de6773ba573ceccdc899d90b94ac7a4f4e2815ecb3fc
                                            • Instruction Fuzzy Hash: 04A16C70E00209DFDF11CFADD9A579DBBF1AF88318F148129D918E7294EB749985CB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d74bd7e51cf8d25aa1b3761ae8ab075e4ad07e83347dc120f8111b828d761cfd
                                            • Instruction ID: 21fc54e8603461432afbd2038f308413d24904b1d64e52e453febaa8f57c4096
                                            • Opcode Fuzzy Hash: d74bd7e51cf8d25aa1b3761ae8ab075e4ad07e83347dc120f8111b828d761cfd
                                            • Instruction Fuzzy Hash: 7E916870E00209CFDB15CFA9C99579EBBF2BF98318F148129E514E7294EB749986CB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3364dabdf6862fea6cadc6cfe5c931f4227fb2a6562da5c17c3447d9184fa94
                                            • Instruction ID: 1c7ab643bcb5f28ded3c9b6fd5f5461d01042fb90bc487487282e817a407ee52
                                            • Opcode Fuzzy Hash: b3364dabdf6862fea6cadc6cfe5c931f4227fb2a6562da5c17c3447d9184fa94
                                            • Instruction Fuzzy Hash: 40718C70E00249CFEF15CFA9C99479EBBF2BF88318F148129E514A7294EB349981CB95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7213a24650648da506daf6b32c02051c11d02b395f8f03ad962ec93e19ef1713
                                            • Instruction ID: 7f0deebf8cb4231ab78847d2270ed6f4b4bb8bc8e5749c546ebf146d2c3623c5
                                            • Opcode Fuzzy Hash: 7213a24650648da506daf6b32c02051c11d02b395f8f03ad962ec93e19ef1713
                                            • Instruction Fuzzy Hash: 1A718BB0E00249CFEB11CFA9C99079DBFF2AF88318F148129E514A7294EB349981CB95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b27f3bd5311292a55d9118b3405f4ecc65f6edf118ee099408b38ac69d85c36d
                                            • Instruction ID: 8d8f83c1c7e2429da3d9ef228a7aebb93b65fd064bab6ce443c8d53aaceafe70
                                            • Opcode Fuzzy Hash: b27f3bd5311292a55d9118b3405f4ecc65f6edf118ee099408b38ac69d85c36d
                                            • Instruction Fuzzy Hash: 185102B0D002188FDB19CFA9C999B9DBBF1BF48314F148129E819BB399D774A844CB95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec2702c527309e53986d7032a169930761dd6746fd0501f64a6a5fde1e45ad71
                                            • Instruction ID: e11ea81fb29857c3931be9fad4aaaab3fee5f8384f5980d678d94e4af30a25a4
                                            • Opcode Fuzzy Hash: ec2702c527309e53986d7032a169930761dd6746fd0501f64a6a5fde1e45ad71
                                            • Instruction Fuzzy Hash: E25114B0D002188FDB19CFA9C999B9DBBF5FF48314F148129E819BB395D774A844CB94
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 710ccffbb4992bfe3c167e02ee4bf591042d7881fb47e031dd9096685b899328
                                            • Instruction ID: c5ed3221ea7fa9b11e16fb148911650798da5005381f2ee8179d69e6e93c5418
                                            • Opcode Fuzzy Hash: 710ccffbb4992bfe3c167e02ee4bf591042d7881fb47e031dd9096685b899328
                                            • Instruction Fuzzy Hash: C55123B0D002188FDB19CFA9C999B9DBBF1FF48314F148129E819BB395D774A844CB95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b637a4553c172137520551a5623dd98b6194d9e96676c1c00371af0f78abc80
                                            • Instruction ID: a64a9479b7c09b958a9021ef287a43bbcf69be2983c7839fefde4026f76181fb
                                            • Opcode Fuzzy Hash: 2b637a4553c172137520551a5623dd98b6194d9e96676c1c00371af0f78abc80
                                            • Instruction Fuzzy Hash: 395110752062858FC70AFB28F9E4B593FB5FBA67047006969E100D722DEA306E85DB41
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3bdff476142761e85a2728b6bd17c1280fc2042782abfa78c8e549dca008a239
                                            • Instruction ID: 6ab9e7d39b68dba61681953a5cc1e07e2e0394dfa214ad5fd0bfe7ea402f603b
                                            • Opcode Fuzzy Hash: 3bdff476142761e85a2728b6bd17c1280fc2042782abfa78c8e549dca008a239
                                            • Instruction Fuzzy Hash: 8A51FE742062858FC719FB28F9E4B553FB5FBA6705300A979E100DB62DEA306F85DB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6cb7873e1ad99b851becba2591ff2775cdb8af6d0cd7945353041382863906e
                                            • Instruction ID: ecd20a928aaba7c3b54a57983b433b02dd515a30110cf286c4bf15697f161716
                                            • Opcode Fuzzy Hash: c6cb7873e1ad99b851becba2591ff2775cdb8af6d0cd7945353041382863906e
                                            • Instruction Fuzzy Hash: D1319479E102059BCB16DFA4D45569EB7FAFF89304F108929E805E7794DB70EC42CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ecfeedeaf596ce6cb72b34761d42b72eae319426915242ce3fcf5166ed87b6b6
                                            • Instruction ID: b2ae046c9262432a7e02139f52e4da8f12ed5572ee2cfb78d35d3476ee034839
                                            • Opcode Fuzzy Hash: ecfeedeaf596ce6cb72b34761d42b72eae319426915242ce3fcf5166ed87b6b6
                                            • Instruction Fuzzy Hash: AB41FEB4D00349DFDB10CFA9C994A9EBFF5EF48314F248029E819AB254DB75A949CF90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 40b642dad0058ca89492686ee4a64ac8842c9f038603a14131de7e8635dd2687
                                            • Instruction ID: 2d10eb0a639a2dbfd12553fc2c033970de953c6ba83135269857a0d2a4bab67d
                                            • Opcode Fuzzy Hash: 40b642dad0058ca89492686ee4a64ac8842c9f038603a14131de7e8635dd2687
                                            • Instruction Fuzzy Hash: A7318578E002059BCB16DFA5C45469EB7FAFF88304F10C929E806E7794DB70AC42CB40
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aacf738ee05ac650f91f643ff2a264615e55d2d3cebaa9eca643b6e2bbf69f62
                                            • Instruction ID: ad816c7a41f26b4728c7304e4cdb2514f80e14fc25da61941f73461af0af50e0
                                            • Opcode Fuzzy Hash: aacf738ee05ac650f91f643ff2a264615e55d2d3cebaa9eca643b6e2bbf69f62
                                            • Instruction Fuzzy Hash: 6641EEB4D00349DFDB10CFA9C994A9EBFF5FF48314F208029E819AB254DB75A949CB90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d06e90c15fcc47f2672b86fdf57333e58d8697cbb196f80d583218d5e32a9f98
                                            • Instruction ID: c4a988b51306f8e5a0631d9c234b29190ae3e3b54823be2170a701a5e89ab5d8
                                            • Opcode Fuzzy Hash: d06e90c15fcc47f2672b86fdf57333e58d8697cbb196f80d583218d5e32a9f98
                                            • Instruction Fuzzy Hash: F5311A307002158FDF1AEB78C5646AE77F6AF99248F100869D811EB394DF36DD41CBA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f1a1b9d18ab6d602425cf738285f52b56f6639cc6cc3ba9fa516cd7f123013f
                                            • Instruction ID: 3837d81524e09667e586a0bacd17b15951df2312a619c4d956693fc967edcf9f
                                            • Opcode Fuzzy Hash: 3f1a1b9d18ab6d602425cf738285f52b56f6639cc6cc3ba9fa516cd7f123013f
                                            • Instruction Fuzzy Hash: 283109306002158FDF1AEB78C5646AE77F6AF59248F100869D811EB3E5DB36DD41CB91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8bf864723d3d393e4f96c99f467bc54a06cbe848e46b15cc4d509e1c1520e95f
                                            • Instruction ID: a78b1f8eba6cf05b9963bebafcc3d1c46d7c7edd5381002e27c6e17f64a3809e
                                            • Opcode Fuzzy Hash: 8bf864723d3d393e4f96c99f467bc54a06cbe848e46b15cc4d509e1c1520e95f
                                            • Instruction Fuzzy Hash: 0331D271E0020A9BCB06CFA8C59079EF7B2BF49308F54D619E809EB395DB709842CB40
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8ba049dbafd85830cb5f94fa164c1b9adb92e4df77d5dd1dc1318f75bb81d95f
                                            • Instruction ID: d5b104bccce916eaa07aed6b145bc33a34b229b6526876bde23ddc9d18388e8b
                                            • Opcode Fuzzy Hash: 8ba049dbafd85830cb5f94fa164c1b9adb92e4df77d5dd1dc1318f75bb81d95f
                                            • Instruction Fuzzy Hash: 9D21A630E0020A9BDB06CFA8D59079EF7B6FF89308F54D519E809EB395DB719842CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 67ecd37b75652acdde73575fe0fdacac931d0bbcfdf4bbc0b38c73eef4dc215c
                                            • Instruction ID: dfbbebfb5297edd577d26d679a72885efb1a1c44b583e80068f41c2047f57f6a
                                            • Opcode Fuzzy Hash: 67ecd37b75652acdde73575fe0fdacac931d0bbcfdf4bbc0b38c73eef4dc215c
                                            • Instruction Fuzzy Hash: 67217431E0021A9BCB1ACFA4D9556DEF7F6AF89308F10852AE815FB391DB70D946CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 250e8eb8463220e5f1cea6e6a459c47483a2a62605452622de42f837f4e10f16
                                            • Instruction ID: b756e2277cc8c5bd4bd0a0b335f68ebd3441538fb2a2651fa2040d3a79e8766f
                                            • Opcode Fuzzy Hash: 250e8eb8463220e5f1cea6e6a459c47483a2a62605452622de42f837f4e10f16
                                            • Instruction Fuzzy Hash: DA21A4786101415FDF27F72CE89475E3BA5EB41B18F106E29E406C729ADB34DD818BC1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e2dc53a277829e15695c7f612fc2ea852987ef1f5b0d250217bb52c54f463e0
                                            • Instruction ID: bde451727636b307d309d89dd8dcdfc94593a68361c0930b90b7ed4917a9a5ca
                                            • Opcode Fuzzy Hash: 4e2dc53a277829e15695c7f612fc2ea852987ef1f5b0d250217bb52c54f463e0
                                            • Instruction Fuzzy Hash: 63216530E0021A9BCB1ACFA8D9546DEF7F6AF89318F10852AE819F7391DB709945CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cbfc516222eb8c6670d6e07c5d17ca1ad0bfe0c70ae522b3350ba8cc5a52d68a
                                            • Instruction ID: 3265a833f0c17d40049499d9b7f3f5cca238d2cd4ea5a35ac5b22f3e0af9361f
                                            • Opcode Fuzzy Hash: cbfc516222eb8c6670d6e07c5d17ca1ad0bfe0c70ae522b3350ba8cc5a52d68a
                                            • Instruction Fuzzy Hash: 34212A30B002158FDB26EB78C5647AE77F6AB49309F100469D506EB394DF36DE41CBA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b77fc63b165beccac6d2a20f2e94ec4e130a8ef93e89c5adc84beb340abb6fc
                                            • Instruction ID: a3a6d1d1a01a224dca6616904be9d5a4b3385e78a410570d4a8ef87ec7fecb65
                                            • Opcode Fuzzy Hash: 2b77fc63b165beccac6d2a20f2e94ec4e130a8ef93e89c5adc84beb340abb6fc
                                            • Instruction Fuzzy Hash: BA2193386101414FDF27F72CE894B5E3BA5EB45B18F106A25E406C729ADF34DD858B91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: de208ebef1ce1fe036e7b57c44a4c2c85ed6bda4766bc0d445d5901095f62d65
                                            • Instruction ID: e8240f8693f8286e0fdb88d66701bdf607789b0d5445605509df81693aa729f9
                                            • Opcode Fuzzy Hash: de208ebef1ce1fe036e7b57c44a4c2c85ed6bda4766bc0d445d5901095f62d65
                                            • Instruction Fuzzy Hash: FE21A2746012408FDB37676CE4A976E3FB1EB03719F51086AF406DB6D6DF29C8818742
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b1caac250d2e8cf9b12a89ddf8319474c4470b35d9106135df6d6f2741b3f76d
                                            • Instruction ID: 41764827c309654664a78363f03c81151bb8cb520ea78236d01a0ef412828498
                                            • Opcode Fuzzy Hash: b1caac250d2e8cf9b12a89ddf8319474c4470b35d9106135df6d6f2741b3f76d
                                            • Instruction Fuzzy Hash: BF214A30B00215CFDB66EB68C5647AE77F6AB49309F10086AD506EB395DB36CE40CBA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be09d7ae42f5186b3b2d1d5392853cf4b984382f1956e1cd06e2f4bd0a7796cc
                                            • Instruction ID: e66c5919dee30aca43f9119be53c177510f0e26eab78de7a9a0fb94d9ac27762
                                            • Opcode Fuzzy Hash: be09d7ae42f5186b3b2d1d5392853cf4b984382f1956e1cd06e2f4bd0a7796cc
                                            • Instruction Fuzzy Hash: 7F11BB746002108BEB37676CE0A976E3FA1EB03719F510869F406DB7D1DF29C8828782
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b660fff9233c9cf85cc31336f121fa4229bcd5979dc0ebb6df754c776e8b359e
                                            • Instruction ID: 378a38829da7324e8f6b8eecab15fc723195bfd7efe461d98f9f7e9edbbea87d
                                            • Opcode Fuzzy Hash: b660fff9233c9cf85cc31336f121fa4229bcd5979dc0ebb6df754c776e8b359e
                                            • Instruction Fuzzy Hash: 67116031B002088BEF2BA77CC4647693BD1FB45298F109939F016CF292DA25CE814BD1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 350c66f6e1c4ac9ab9452934f39865b1462e04936f5d3e30a1db6020606904b5
                                            • Instruction ID: e1e29c96e302ad8d491228b7012bfa0af7a9e4ac77c600cd40c0808a63abe7e4
                                            • Opcode Fuzzy Hash: 350c66f6e1c4ac9ab9452934f39865b1462e04936f5d3e30a1db6020606904b5
                                            • Instruction Fuzzy Hash: 2811CA35A002048BEF2B577CD4743793BD5F742298F144935F412DF2C2DA25CA814BD2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 82eaf085698300fcc99268fa1acc96523797562536aa208d3192780874760651
                                            • Instruction ID: 6adc66d0d297ea5e054ea82a7a434fc72c4a7559091598a207ffd2e0148ff92a
                                            • Opcode Fuzzy Hash: 82eaf085698300fcc99268fa1acc96523797562536aa208d3192780874760651
                                            • Instruction Fuzzy Hash: CB110874600146DFCB16EBA8F99479D7BA1EB80304F006AA9D444DB2E5DF319E41DB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 13a79766b01f7493655a1318506c8a49c3413b4d3cd59d54abb0264b25b9c88c
                                            • Instruction ID: 9a5591202188403d459bb16e41aa6477ea90fb3308d291abbf00083c43ced9a6
                                            • Opcode Fuzzy Hash: 13a79766b01f7493655a1318506c8a49c3413b4d3cd59d54abb0264b25b9c88c
                                            • Instruction Fuzzy Hash: 1C11E176F002119FCB11ABB9991875F7FF9EB49754F100925EA05D3344EA34DA0287D1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70b1e22cd757ba3a6aa2f2c74edee7114acaaae1cd3ed3014302d25fb99c1443
                                            • Instruction ID: a21ab28d3e010908cfe7190b78dc93ebd7c49cb819771842632fa7be3c5c188e
                                            • Opcode Fuzzy Hash: 70b1e22cd757ba3a6aa2f2c74edee7114acaaae1cd3ed3014302d25fb99c1443
                                            • Instruction Fuzzy Hash: 3D116171A002158FCB27EFBC85602AE7BF5EB58359B15047ED405E7381EB36C8418B91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f95c9bb1f2cb1f3ac8ff401047cb4e5bdaf9da9b1f1f420377f7c4c386bb304
                                            • Instruction ID: 71d369aa6e1df46f26d8582e60bfc1f394c9992539931293c73a75a8b73b05fc
                                            • Opcode Fuzzy Hash: 4f95c9bb1f2cb1f3ac8ff401047cb4e5bdaf9da9b1f1f420377f7c4c386bb304
                                            • Instruction Fuzzy Hash: F701C075B002159FCB11ABB9991875F7FE9AB89754F100925EA09D3344EA34DA028BD0
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3283d513703ecf83e89b206af3fbad8f3f7cec1b6172da6a7b75c35a17866f47
                                            • Instruction ID: c2569aacd8adadd1530810559682869291f7041b77d201ba6cf7a4a8eaf7dea0
                                            • Opcode Fuzzy Hash: 3283d513703ecf83e89b206af3fbad8f3f7cec1b6172da6a7b75c35a17866f47
                                            • Instruction Fuzzy Hash: 0E012D31A002159BCB26EFBD84602AEBBF5EB58259B15047AD905E7381EA36C8418BA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 565fae18d1814c22896348399dd9fa8e306b7d5770a081159d678d34f0f7fd15
                                            • Instruction ID: c655bc90cde37a64ad8808a341dd6afd0716b8797f3b8b75ecb8edc292dd94d4
                                            • Opcode Fuzzy Hash: 565fae18d1814c22896348399dd9fa8e306b7d5770a081159d678d34f0f7fd15
                                            • Instruction Fuzzy Hash: 4AF0EC39B00204CFC714DB74D5A9B6C77B2EF89715F5044A8E9069B3A4DF35AD42CB40
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.1940916409.0000000001300000.00000040.00000800.00020000.00000000.sdmp, Offset: 01300000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_1300000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae07b11a6cf161012f7089e42a20673fee9805b6583a52cbb5d62875c885a5cc
                                            • Instruction ID: 7fc4b0a9a98f3f3ef51dfcbfbb05c999e96870be4d58d79f02018355ac58bb2e
                                            • Opcode Fuzzy Hash: ae07b11a6cf161012f7089e42a20673fee9805b6583a52cbb5d62875c885a5cc
                                            • Instruction Fuzzy Hash: E8F06274901109EFCB45FBB8F990A9D7BB1FB40300F506A78D404EB268EE312F449B91

                                            Execution Graph

                                            Execution Coverage:10.5%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:234
                                            Total number of Limit Nodes:13
                                            execution_graph 38942 75292a0 38943 75292da 38942->38943 38944 7529356 38943->38944 38945 752936b 38943->38945 38950 7528b90 38944->38950 38946 7528b90 CreateIconFromResourceEx 38945->38946 38948 752937a 38946->38948 38952 7528b9b 38950->38952 38951 7529361 38952->38951 38955 7529cc0 38952->38955 38958 7529cb0 38952->38958 38961 7528bd8 38955->38961 38959 7529cda 38958->38959 38960 7528bd8 CreateIconFromResourceEx 38958->38960 38959->38951 38960->38959 38962 7529d10 CreateIconFromResourceEx 38961->38962 38963 7529cda 38962->38963 38963->38951 38964 2f3d740 38965 2f3d786 38964->38965 38968 2f3dd28 38965->38968 38971 2f3d97c 38968->38971 38972 2f3dd90 DuplicateHandle 38971->38972 38973 2f3d873 38972->38973 38854 2f34668 38855 2f3467a 38854->38855 38856 2f34686 38855->38856 38860 2f34778 38855->38860 38865 2f34210 38856->38865 38858 2f346a5 38861 2f3479d 38860->38861 38869 2f34888 38861->38869 38873 2f34879 38861->38873 38866 2f3421b 38865->38866 38881 2f35e60 38866->38881 38868 2f37791 38868->38858 38870 2f348af 38869->38870 38871 2f3498c 38870->38871 38877 2f344d4 38870->38877 38875 2f34888 38873->38875 38874 2f3498c 38874->38874 38875->38874 38876 2f344d4 CreateActCtxA 38875->38876 38876->38874 38878 2f35918 CreateActCtxA 38877->38878 38880 2f359db 38878->38880 38882 2f35e6b 38881->38882 38885 2f3734c 38882->38885 38884 2f37975 38884->38868 38886 2f37357 38885->38886 38889 2f3737c 38886->38889 38888 2f37a5a 38888->38884 38890 2f37387 38889->38890 38893 2f373ac 38890->38893 38892 2f37b4d 38892->38888 38894 2f373b7 38893->38894 38896 2f38ccb 38894->38896 38900 2f3b379 38894->38900 38895 2f38d09 38895->38892 38896->38895 38904 2f3d46a 38896->38904 38909 2f3d478 38896->38909 38914 2f3b3b0 38900->38914 38917 2f3b39f 38900->38917 38901 2f3b38e 38901->38896 38905 2f3d478 38904->38905 38906 2f3d4bd 38905->38906 38926 2f3d628 38905->38926 38930 2f3d618 38905->38930 38906->38895 38910 2f3d499 38909->38910 38911 2f3d4bd 38910->38911 38912 2f3d628 GetModuleHandleW 38910->38912 38913 2f3d618 GetModuleHandleW 38910->38913 38911->38895 38912->38911 38913->38911 38921 2f3b498 38914->38921 38915 2f3b3bf 38915->38901 38918 2f3b3b0 38917->38918 38920 2f3b498 GetModuleHandleW 38918->38920 38919 2f3b3bf 38919->38901 38920->38919 38922 2f3b4dc 38921->38922 38923 2f3b4b9 38921->38923 38922->38915 38923->38922 38924 2f3b6e0 GetModuleHandleW 38923->38924 38925 2f3b70d 38924->38925 38925->38915 38928 2f3d635 38926->38928 38927 2f3d66f 38927->38906 38928->38927 38934 2f3c1e0 38928->38934 38931 2f3d628 38930->38931 38932 2f3c1e0 GetModuleHandleW 38931->38932 38933 2f3d66f 38931->38933 38932->38933 38933->38906 38936 2f3c1eb 38934->38936 38935 2f3e388 38936->38935 38938 2f3d9dc 38936->38938 38939 2f3d9e7 38938->38939 38940 2f373ac GetModuleHandleW 38939->38940 38941 2f3e3f7 38940->38941 38941->38935 38676 75edfd3 38678 75eddc6 38676->38678 38677 75edfbd 38678->38677 38682 75ef590 38678->38682 38698 75ef581 38678->38698 38714 75ef631 38678->38714 38683 75ef5aa 38682->38683 38689 75ef5b2 38683->38689 38730 c36001d 38683->38730 38736 c360350 38683->38736 38741 c360332 38683->38741 38746 c360554 38683->38746 38754 c360617 38683->38754 38763 c36016b 38683->38763 38769 c36040b 38683->38769 38773 c3606ea 38683->38773 38778 c36092a 38683->38778 38782 c3602ac 38683->38782 38787 c3607ce 38683->38787 38792 c360040 38683->38792 38798 c360327 38683->38798 38689->38678 38699 75ef590 38698->38699 38700 c360617 4 API calls 38699->38700 38701 c360554 4 API calls 38699->38701 38702 c360332 2 API calls 38699->38702 38703 c360350 2 API calls 38699->38703 38704 c36001d 2 API calls 38699->38704 38705 75ef5b2 38699->38705 38706 c360327 4 API calls 38699->38706 38707 c360040 2 API calls 38699->38707 38708 c3607ce 2 API calls 38699->38708 38709 c3602ac 2 API calls 38699->38709 38710 c36092a 2 API calls 38699->38710 38711 c3606ea 2 API calls 38699->38711 38712 c36040b 2 API calls 38699->38712 38713 c36016b 2 API calls 38699->38713 38700->38705 38701->38705 38702->38705 38703->38705 38704->38705 38705->38678 38706->38705 38707->38705 38708->38705 38709->38705 38710->38705 38711->38705 38712->38705 38713->38705 38715 75ef5cc 38714->38715 38716 75ef5b2 38715->38716 38717 c360617 4 API calls 38715->38717 38718 c360554 4 API calls 38715->38718 38719 c360332 2 API calls 38715->38719 38720 c360350 2 API calls 38715->38720 38721 c36001d 2 API calls 38715->38721 38722 c360327 4 API calls 38715->38722 38723 c360040 2 API calls 38715->38723 38724 c3607ce 2 API calls 38715->38724 38725 c3602ac 2 API calls 38715->38725 38726 c36092a 2 API calls 38715->38726 38727 c3606ea 2 API calls 38715->38727 38728 c36040b 2 API calls 38715->38728 38729 c36016b 2 API calls 38715->38729 38716->38678 38717->38716 38718->38716 38719->38716 38720->38716 38721->38716 38722->38716 38723->38716 38724->38716 38725->38716 38726->38716 38727->38716 38728->38716 38729->38716 38731 c360040 38730->38731 38732 c360165 38731->38732 38806 75ed9a5 38731->38806 38810 75ed9b0 38731->38810 38732->38689 38737 c360359 38736->38737 38738 c360436 38737->38738 38814 75ed2e8 38737->38814 38818 75ed2f0 38737->38818 38742 c360338 38741->38742 38822 75ed0a8 38742->38822 38826 75ed0a2 38742->38826 38743 c3607fa 38830 75ed158 38746->38830 38834 75ed150 38746->38834 38747 c3607a0 38747->38689 38748 c360349 38748->38747 38752 75ed0a8 ResumeThread 38748->38752 38753 75ed0a2 ResumeThread 38748->38753 38749 c3607fa 38752->38749 38753->38749 38755 c3605e4 38754->38755 38756 c36067f 38754->38756 38755->38754 38758 c360282 38755->38758 38761 75ed158 Wow64SetThreadContext 38755->38761 38762 75ed150 Wow64SetThreadContext 38755->38762 38756->38758 38759 75ed0a8 ResumeThread 38756->38759 38760 75ed0a2 ResumeThread 38756->38760 38757 c3607fa 38758->38689 38759->38757 38760->38757 38761->38756 38762->38756 38764 c360165 38763->38764 38765 c3600fc 38763->38765 38764->38689 38765->38764 38767 75ed9a5 CreateProcessA 38765->38767 38768 75ed9b0 CreateProcessA 38765->38768 38766 c360257 38766->38689 38767->38766 38768->38766 38771 75ed2e8 WriteProcessMemory 38769->38771 38772 75ed2f0 WriteProcessMemory 38769->38772 38770 c360436 38771->38770 38772->38770 38774 c3606fc 38773->38774 38838 75ed3d8 38774->38838 38842 75ed3e0 38774->38842 38775 c360282 38780 75ed2e8 WriteProcessMemory 38778->38780 38781 75ed2f0 WriteProcessMemory 38778->38781 38779 c36095b 38779->38689 38780->38779 38781->38779 38783 c3602cf 38782->38783 38785 75ed2e8 WriteProcessMemory 38783->38785 38786 75ed2f0 WriteProcessMemory 38783->38786 38784 c3602f3 38784->38689 38785->38784 38786->38784 38788 c3607d4 38787->38788 38790 75ed0a8 ResumeThread 38788->38790 38791 75ed0a2 ResumeThread 38788->38791 38789 c3607fa 38790->38789 38791->38789 38794 c360047 38792->38794 38793 c360165 38793->38689 38794->38793 38796 75ed9a5 CreateProcessA 38794->38796 38797 75ed9b0 CreateProcessA 38794->38797 38795 c360257 38795->38689 38796->38795 38797->38795 38799 c360819 38798->38799 38846 75ed22a 38799->38846 38850 75ed230 38799->38850 38800 c3602f3 38800->38689 38801 c3602cf 38801->38800 38802 75ed2e8 WriteProcessMemory 38801->38802 38803 75ed2f0 WriteProcessMemory 38801->38803 38802->38800 38803->38800 38807 75eda39 CreateProcessA 38806->38807 38809 75edbfb 38807->38809 38809->38809 38811 75eda39 CreateProcessA 38810->38811 38813 75edbfb 38811->38813 38813->38813 38815 75ed2f0 WriteProcessMemory 38814->38815 38817 75ed38f 38815->38817 38817->38738 38819 75ed338 WriteProcessMemory 38818->38819 38821 75ed38f 38819->38821 38821->38738 38823 75ed0e8 ResumeThread 38822->38823 38825 75ed119 38823->38825 38825->38743 38827 75ed0a8 ResumeThread 38826->38827 38829 75ed119 38827->38829 38829->38743 38831 75ed19d Wow64SetThreadContext 38830->38831 38833 75ed1e5 38831->38833 38833->38748 38835 75ed158 Wow64SetThreadContext 38834->38835 38837 75ed1e5 38835->38837 38837->38748 38839 75ed42b ReadProcessMemory 38838->38839 38841 75ed46f 38839->38841 38841->38775 38843 75ed42b ReadProcessMemory 38842->38843 38845 75ed46f 38843->38845 38845->38775 38847 75ed230 VirtualAllocEx 38846->38847 38849 75ed2ad 38847->38849 38849->38801 38851 75ed270 VirtualAllocEx 38850->38851 38853 75ed2ad 38851->38853 38853->38801 38974 c360f88 38975 c361113 38974->38975 38976 c360fae 38974->38976 38976->38975 38979 c361202 38976->38979 38982 c361208 PostMessageW 38976->38982 38980 c361208 PostMessageW 38979->38980 38981 c361274 38980->38981 38981->38976 38983 c361274 38982->38983 38983->38976

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 950 75ed9a5-75eda45 952 75eda7e-75eda9e 950->952 953 75eda47-75eda51 950->953 960 75edad7-75edb06 952->960 961 75edaa0-75edaaa 952->961 953->952 954 75eda53-75eda55 953->954 955 75eda78-75eda7b 954->955 956 75eda57-75eda61 954->956 955->952 958 75eda65-75eda74 956->958 959 75eda63 956->959 958->958 962 75eda76 958->962 959->958 967 75edb3f-75edbf9 CreateProcessA 960->967 968 75edb08-75edb12 960->968 961->960 963 75edaac-75edaae 961->963 962->955 965 75edab0-75edaba 963->965 966 75edad1-75edad4 963->966 969 75edabe-75edacd 965->969 970 75edabc 965->970 966->960 981 75edbfb-75edc01 967->981 982 75edc02-75edc88 967->982 968->967 971 75edb14-75edb16 968->971 969->969 972 75edacf 969->972 970->969 973 75edb18-75edb22 971->973 974 75edb39-75edb3c 971->974 972->966 976 75edb26-75edb35 973->976 977 75edb24 973->977 974->967 976->976 978 75edb37 976->978 977->976 978->974 981->982 992 75edc8a-75edc8e 982->992 993 75edc98-75edc9c 982->993 992->993 994 75edc90 992->994 995 75edc9e-75edca2 993->995 996 75edcac-75edcb0 993->996 994->993 995->996 997 75edca4 995->997 998 75edcb2-75edcb6 996->998 999 75edcc0-75edcc4 996->999 997->996 998->999 1000 75edcb8 998->1000 1001 75edcd6-75edcdd 999->1001 1002 75edcc6-75edccc 999->1002 1000->999 1003 75edcdf-75edcee 1001->1003 1004 75edcf4 1001->1004 1002->1001 1003->1004 1006 75edcf5 1004->1006 1006->1006
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075EDBE6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 4a0d3acaa8f8d7d75857dc6bc643f829528bbcf2a66a1873f63c9828a21a721a
                                            • Instruction ID: ba9dd03ebe8ca1a0d302c724f60b88adafa154b31f1003b33aa40fe2246c6a28
                                            • Opcode Fuzzy Hash: 4a0d3acaa8f8d7d75857dc6bc643f829528bbcf2a66a1873f63c9828a21a721a
                                            • Instruction Fuzzy Hash: 17A14BB1E0031ADFDB24DF68C9417EDBBB6BF48314F14816AD848A7280DB749A85CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1007 75ed9b0-75eda45 1009 75eda7e-75eda9e 1007->1009 1010 75eda47-75eda51 1007->1010 1017 75edad7-75edb06 1009->1017 1018 75edaa0-75edaaa 1009->1018 1010->1009 1011 75eda53-75eda55 1010->1011 1012 75eda78-75eda7b 1011->1012 1013 75eda57-75eda61 1011->1013 1012->1009 1015 75eda65-75eda74 1013->1015 1016 75eda63 1013->1016 1015->1015 1019 75eda76 1015->1019 1016->1015 1024 75edb3f-75edbf9 CreateProcessA 1017->1024 1025 75edb08-75edb12 1017->1025 1018->1017 1020 75edaac-75edaae 1018->1020 1019->1012 1022 75edab0-75edaba 1020->1022 1023 75edad1-75edad4 1020->1023 1026 75edabe-75edacd 1022->1026 1027 75edabc 1022->1027 1023->1017 1038 75edbfb-75edc01 1024->1038 1039 75edc02-75edc88 1024->1039 1025->1024 1028 75edb14-75edb16 1025->1028 1026->1026 1029 75edacf 1026->1029 1027->1026 1030 75edb18-75edb22 1028->1030 1031 75edb39-75edb3c 1028->1031 1029->1023 1033 75edb26-75edb35 1030->1033 1034 75edb24 1030->1034 1031->1024 1033->1033 1035 75edb37 1033->1035 1034->1033 1035->1031 1038->1039 1049 75edc8a-75edc8e 1039->1049 1050 75edc98-75edc9c 1039->1050 1049->1050 1051 75edc90 1049->1051 1052 75edc9e-75edca2 1050->1052 1053 75edcac-75edcb0 1050->1053 1051->1050 1052->1053 1054 75edca4 1052->1054 1055 75edcb2-75edcb6 1053->1055 1056 75edcc0-75edcc4 1053->1056 1054->1053 1055->1056 1057 75edcb8 1055->1057 1058 75edcd6-75edcdd 1056->1058 1059 75edcc6-75edccc 1056->1059 1057->1056 1060 75edcdf-75edcee 1058->1060 1061 75edcf4 1058->1061 1059->1058 1060->1061 1063 75edcf5 1061->1063 1063->1063
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075EDBE6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 924855be1a72218d1f9357129420aaf13d14f38cccb013233ac9959d309ee2e1
                                            • Instruction ID: bc6e827ec36c55d382711dc6f07bcb689e26d63a749b6de6a48a76f5185ee754
                                            • Opcode Fuzzy Hash: 924855be1a72218d1f9357129420aaf13d14f38cccb013233ac9959d309ee2e1
                                            • Instruction Fuzzy Hash: E1914BB1E0031ADFDB24DF68C941BDDBBB6BF48314F14816AD809A7290DB749A85CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1064 2f3b498-2f3b4b7 1065 2f3b4e3-2f3b4e7 1064->1065 1066 2f3b4b9-2f3b4c6 call 2f3a7cc 1064->1066 1068 2f3b4fb-2f3b53c 1065->1068 1069 2f3b4e9-2f3b4f3 1065->1069 1072 2f3b4c8 1066->1072 1073 2f3b4dc 1066->1073 1075 2f3b549-2f3b557 1068->1075 1076 2f3b53e-2f3b546 1068->1076 1069->1068 1119 2f3b4ce call 2f3b740 1072->1119 1120 2f3b4ce call 2f3b730 1072->1120 1073->1065 1077 2f3b57b-2f3b57d 1075->1077 1078 2f3b559-2f3b55e 1075->1078 1076->1075 1083 2f3b580-2f3b587 1077->1083 1080 2f3b560-2f3b567 call 2f3a7d8 1078->1080 1081 2f3b569 1078->1081 1079 2f3b4d4-2f3b4d6 1079->1073 1082 2f3b618-2f3b6d8 1079->1082 1085 2f3b56b-2f3b579 1080->1085 1081->1085 1114 2f3b6e0-2f3b70b GetModuleHandleW 1082->1114 1115 2f3b6da-2f3b6dd 1082->1115 1086 2f3b594-2f3b59b 1083->1086 1087 2f3b589-2f3b591 1083->1087 1085->1083 1090 2f3b5a8-2f3b5b1 call 2f3a7e8 1086->1090 1091 2f3b59d-2f3b5a5 1086->1091 1087->1086 1095 2f3b5b3-2f3b5bb 1090->1095 1096 2f3b5be-2f3b5c3 1090->1096 1091->1090 1095->1096 1097 2f3b5e1-2f3b5e5 1096->1097 1098 2f3b5c5-2f3b5cc 1096->1098 1103 2f3b5eb-2f3b5ee 1097->1103 1098->1097 1100 2f3b5ce-2f3b5de call 2f3a7f8 call 2f3a808 1098->1100 1100->1097 1105 2f3b611-2f3b617 1103->1105 1106 2f3b5f0-2f3b60e 1103->1106 1106->1105 1116 2f3b714-2f3b728 1114->1116 1117 2f3b70d-2f3b713 1114->1117 1115->1114 1117->1116 1119->1079 1120->1079
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02F3B6FE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1946265590.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2f30000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: 4250ff795011a67149b374365a141dce77abc71f841912be7fdd0a454b2ec332
                                            • Instruction ID: 53a70ca1bbc16b2eadedce4e882c87883f72648494805b47ae3b7d1a0a4552a4
                                            • Opcode Fuzzy Hash: 4250ff795011a67149b374365a141dce77abc71f841912be7fdd0a454b2ec332
                                            • Instruction Fuzzy Hash: 888142B0A00B498FDB65DF29C56075ABBF1BF88348F04892ED586D7A50DB34E845CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1121 2f3590c-2f35913 1122 2f35918-2f359d9 CreateActCtxA 1121->1122 1124 2f359e2-2f35a3c 1122->1124 1125 2f359db-2f359e1 1122->1125 1132 2f35a4b-2f35a4f 1124->1132 1133 2f35a3e-2f35a41 1124->1133 1125->1124 1134 2f35a51-2f35a5d 1132->1134 1135 2f35a60-2f35a90 1132->1135 1133->1132 1134->1135 1139 2f35a42 1135->1139 1140 2f35a92-2f35a97 1135->1140 1142 2f35ab2-2f35ab7 1139->1142 1143 2f35a44-2f35a4a 1139->1143 1141 2f35b09-2f35b14 1140->1141 1142->1141 1143->1132
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02F359C9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1946265590.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2f30000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: b27ec2faa9a96952110e313a63002b478bb2109ef851c46959c0d7c8303d0943
                                            • Instruction ID: 8d88ab852e84c5ab11613a4c1034e19db096833aa30cd736196e2f386aa0164e
                                            • Opcode Fuzzy Hash: b27ec2faa9a96952110e313a63002b478bb2109ef851c46959c0d7c8303d0943
                                            • Instruction Fuzzy Hash: 8841C0B0C00719CBDF25CFA9C984B8EBBF6BF88304F60815AD508AB255DB756949CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1144 2f344d4-2f359d9 CreateActCtxA 1147 2f359e2-2f35a3c 1144->1147 1148 2f359db-2f359e1 1144->1148 1155 2f35a4b-2f35a4f 1147->1155 1156 2f35a3e-2f35a41 1147->1156 1148->1147 1157 2f35a51-2f35a5d 1155->1157 1158 2f35a60-2f35a90 1155->1158 1156->1155 1157->1158 1162 2f35a42 1158->1162 1163 2f35a92-2f35a97 1158->1163 1165 2f35ab2-2f35ab7 1162->1165 1166 2f35a44-2f35a4a 1162->1166 1164 2f35b09-2f35b14 1163->1164 1165->1164 1166->1155
                                            APIs
                                            • CreateActCtxA.KERNEL32(?), ref: 02F359C9
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1946265590.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2f30000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: 41d394705f7cb758b38f4e80b240e6fac08a7beff599d2a83adb899e3fd4756b
                                            • Instruction ID: 625cc3c0cc9e4a2a6756b3e13579157cb3a8b889fa2a328f2e7ee05f183065f5
                                            • Opcode Fuzzy Hash: 41d394705f7cb758b38f4e80b240e6fac08a7beff599d2a83adb899e3fd4756b
                                            • Instruction Fuzzy Hash: 8541BFB0D00619CADB25CFA9C984B9EBBF6BF88304F60806AD508AB255DB756945CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1167 75ed2e8-75ed33e 1170 75ed34e-75ed38d WriteProcessMemory 1167->1170 1171 75ed340-75ed34c 1167->1171 1173 75ed38f-75ed395 1170->1173 1174 75ed396-75ed3c6 1170->1174 1171->1170 1173->1174
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075ED380
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 5373ff5b6c86e6a52e764346409e5ba3ade0e5f4ec78c213d6784998dac9de87
                                            • Instruction ID: f33590e8e3133aa11919da7bf2b15123b458255043dbe6c5a8b2786b156ff169
                                            • Opcode Fuzzy Hash: 5373ff5b6c86e6a52e764346409e5ba3ade0e5f4ec78c213d6784998dac9de87
                                            • Instruction Fuzzy Hash: E02126B59003499FCF14CFA9C981BDEBBF5FF48320F10842AE918A7240D778A944DBA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1178 75ed2f0-75ed33e 1180 75ed34e-75ed38d WriteProcessMemory 1178->1180 1181 75ed340-75ed34c 1178->1181 1183 75ed38f-75ed395 1180->1183 1184 75ed396-75ed3c6 1180->1184 1181->1180 1183->1184
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075ED380
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: f76f4cdf1b352b2016447fc044f082afece237f26cd74cca5621631343405fde
                                            • Instruction ID: 33bbcaa476f81724691fb338501c2758557d372b1788623bb86560dfbd3dcd43
                                            • Opcode Fuzzy Hash: f76f4cdf1b352b2016447fc044f082afece237f26cd74cca5621631343405fde
                                            • Instruction Fuzzy Hash: A92127B59003499FCB10CFA9C981BDEBBF5FF48320F10842AE918A7240C7789940DBA0
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075ED1D6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: bd93a5935bb4d5e51a55429811a39ab009b5c161cf2289539eeaa72057874b02
                                            • Instruction ID: 22efb5da90f8b281af5a4a0eda1627937b0d02adecee2bbd178ca831b54b924a
                                            • Opcode Fuzzy Hash: bd93a5935bb4d5e51a55429811a39ab009b5c161cf2289539eeaa72057874b02
                                            • Instruction Fuzzy Hash: B0212AB19003099FDB14DFAAC5857EEBBF5EB48324F14842AD519A7240C778A545CF91
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F3DD56,?,?,?,?,?), ref: 02F3DE17
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1946265590.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2f30000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: a149fb5cc49f0740e18f0c459bb7b7871446ca1548e9d1fce37268b034380ab7
                                            • Instruction ID: 7a6bd9dc656099dc19ee0425f72ba76442852d89e918fd680e6b473da0126f1b
                                            • Opcode Fuzzy Hash: a149fb5cc49f0740e18f0c459bb7b7871446ca1548e9d1fce37268b034380ab7
                                            • Instruction Fuzzy Hash: 0821E5B5D00248DFDB10CF9AD984ADEBFF8EB48314F14845AE914A7310D375A950CFA4
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075ED460
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: 111c01bdafed0fe8c2a72050332ab9a221409ca331651e16c1b59bbc70bc2a3a
                                            • Instruction ID: 6370c8099af7e84cf786ab3e764074888b6293e04f088d8bc76b0e786dd28824
                                            • Opcode Fuzzy Hash: 111c01bdafed0fe8c2a72050332ab9a221409ca331651e16c1b59bbc70bc2a3a
                                            • Instruction Fuzzy Hash: 25212AB1D003499FDB10CFAAC981ADEBBF5FF48320F14842AE959A7250D7799900DBA1
                                            APIs
                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075ED460
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MemoryProcessRead
                                            • String ID:
                                            • API String ID: 1726664587-0
                                            • Opcode ID: f8a6e0ab5511ff2599ca010c69fc0aefd5b1c5237a192e5d15710c4810fd1cf7
                                            • Instruction ID: 0c4863ef7e8fb7a2f49f2aaf94570006712f93be48c285e9deb06e6095006ac9
                                            • Opcode Fuzzy Hash: f8a6e0ab5511ff2599ca010c69fc0aefd5b1c5237a192e5d15710c4810fd1cf7
                                            • Instruction Fuzzy Hash: 032128B1D003499FCB10CFAAC981ADEBBF5FF48320F10842AE559A7240C779A500DBA1
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 075ED1D6
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 4d5e4ae5576e229b8cc1ca39c20437bb395ff7e561498969b2e0de6ec3bc5eef
                                            • Instruction ID: eec170f9a9e7afc15cceed6dd6ef283aeec4520fa0f5fe19d6427a65524bbfc0
                                            • Opcode Fuzzy Hash: 4d5e4ae5576e229b8cc1ca39c20437bb395ff7e561498969b2e0de6ec3bc5eef
                                            • Instruction Fuzzy Hash: 032109B19003098FDB14DFAAC5857EEBBF5AF88324F14842AD559A7240C778A544CFA1
                                            APIs
                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,07529CDA,?,?,?,?,?), ref: 07529D7F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1954984872.0000000007520000.00000040.00000800.00020000.00000000.sdmp, Offset: 07520000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7520000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: CreateFromIconResource
                                            • String ID:
                                            • API String ID: 3668623891-0
                                            • Opcode ID: cf09673f816542c36fee38ccbcde468615486cfd84346691edc4d07da1df0b0e
                                            • Instruction ID: c1abcddc415a313780b9e8cd05eea9369375ee62f8b6dd3792d65834ae3f2e47
                                            • Opcode Fuzzy Hash: cf09673f816542c36fee38ccbcde468615486cfd84346691edc4d07da1df0b0e
                                            • Instruction Fuzzy Hash: 391126B68002599FDB10DF9AC844BDEBFF8EB58320F14841AE914A7250C379A954EFA5
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075ED29E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: ab5f9e6d0f724884701fcf97b2d615d821cb307a57d7e159072ab09d15bbc82d
                                            • Instruction ID: 660c549676a5bfa5bc485d448096015eccf39ad7640ff4197bc73db37a9605ab
                                            • Opcode Fuzzy Hash: ab5f9e6d0f724884701fcf97b2d615d821cb307a57d7e159072ab09d15bbc82d
                                            • Instruction Fuzzy Hash: 991159B29002499FCB10DFAAC845ADEBBF9EF88324F108419E519A7250C779A540DFA1
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075ED29E
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: ff36741c042e1a4e91afedc881f6a54aef31c1c36d2f0665be76b3c412bf527a
                                            • Instruction ID: 6a001c9f89c5cfb29c58d39b551838f3f474ef184fd87606fbdcba6add15cf8e
                                            • Opcode Fuzzy Hash: ff36741c042e1a4e91afedc881f6a54aef31c1c36d2f0665be76b3c412bf527a
                                            • Instruction Fuzzy Hash: BE113AB19003499FCB10DFAAC945ADEBFF5EF88324F148419E519A7250C775A540DFA1
                                            APIs
                                            • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,07529CDA,?,?,?,?,?), ref: 07529D7F
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1954984872.0000000007520000.00000040.00000800.00020000.00000000.sdmp, Offset: 07520000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_7520000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: CreateFromIconResource
                                            • String ID:
                                            • API String ID: 3668623891-0
                                            • Opcode ID: 09fe2491008a885ad8178a863708d33338058e98bfc38b74f8de25e6252c791f
                                            • Instruction ID: 6e20e4797946d890b2b7c715aeb5ecc608de88ca0e3684378b0a9a32d7ad4f3d
                                            • Opcode Fuzzy Hash: 09fe2491008a885ad8178a863708d33338058e98bfc38b74f8de25e6252c791f
                                            • Instruction Fuzzy Hash: 301126B68002599FDB10CF99C944BDEBFF8AB58320F14841AE514A7250C379A954DFA0
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: e5bb44848c2584290bfba2626727fb40085a2da1ca24c6404336ded678d5c697
                                            • Instruction ID: 80bf9930e7a7cc99ad5035814c429262391019d7a0bf6f4fadef93a4be1096d8
                                            • Opcode Fuzzy Hash: e5bb44848c2584290bfba2626727fb40085a2da1ca24c6404336ded678d5c697
                                            • Instruction Fuzzy Hash: FE1128B19003498FDB24DFAAC445BDEFBF9EB88324F24841AD519A7240C779A944CF95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1955065645.00000000075E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 075E0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_75e0000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: f76c1cbe7aba1276e288d80261fc24f550fa216acaa150c3e9c41615c1bc316e
                                            • Instruction ID: 1f58b259e8c2f8f45d8746ff272030505a7ee0de4571c786eb71158422a60112
                                            • Opcode Fuzzy Hash: f76c1cbe7aba1276e288d80261fc24f550fa216acaa150c3e9c41615c1bc316e
                                            • Instruction Fuzzy Hash: DE1128B19003498BDB24DFAAC4457DEFBF9EB88324F24841AD519A7240C679A540CB95
                                            APIs
                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 02F3B6FE
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1946265590.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_2f30000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: HandleModule
                                            • String ID:
                                            • API String ID: 4139908857-0
                                            • Opcode ID: b11d2a02b2aeb4fc5cb18e38930d1cd57dea4fbbcd01a971361e7679188ee8bf
                                            • Instruction ID: 534a29a42d35c30b677c673cb077c9a7bc319a47b2ee01297522c3f1ea4835a3
                                            • Opcode Fuzzy Hash: b11d2a02b2aeb4fc5cb18e38930d1cd57dea4fbbcd01a971361e7679188ee8bf
                                            • Instruction Fuzzy Hash: 8C11DFB5C006498FCB10CF9AC544ADEFBF5EB88328F14845AD519A7610C379A545CFA1
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 0C361265
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1956622278.000000000C360000.00000040.00000800.00020000.00000000.sdmp, Offset: 0C360000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_c360000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: 8c08a13e1e783a34e388e4ff2589f75b21dc394f41ca5de8acfdecf75b470501
                                            • Instruction ID: d5ea6b1f2e3e92be0b0eda5cef6cad078f7a1c800e930a4c15f3c7f711fba435
                                            • Opcode Fuzzy Hash: 8c08a13e1e783a34e388e4ff2589f75b21dc394f41ca5de8acfdecf75b470501
                                            • Instruction Fuzzy Hash: 3711D0B5800349DFDB10CF9AD985BDEBBF8FB48324F20845AE558A7650C379A944CFA1
                                            APIs
                                            • PostMessageW.USER32(?,?,?,?), ref: 0C361265
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1956622278.000000000C360000.00000040.00000800.00020000.00000000.sdmp, Offset: 0C360000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_c360000_kOtBoy.jbxd
                                            Similarity
                                            • API ID: MessagePost
                                            • String ID:
                                            • API String ID: 410705778-0
                                            • Opcode ID: f83b83d46346902d2a8eda2afc2cccfc3ae00dc3a8bd50712a2c9251da98de84
                                            • Instruction ID: 2f33cfb3dfda7a38ed0eb1d5fce3b2a93dc6cc0fb71e76314bd1f5cade36dfb5
                                            • Opcode Fuzzy Hash: f83b83d46346902d2a8eda2afc2cccfc3ae00dc3a8bd50712a2c9251da98de84
                                            • Instruction Fuzzy Hash: 1F11D0B5800349DFDB10CF9AD985BDEBBF8EB48324F20845AE558A7650C379A944CFA1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939773765.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_145d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eadf94fe902846e4ba497e3fd5434d707edd5f5ed301daedef8430de467c9a0a
                                            • Instruction ID: d4de74610bd012c3e3823c7954c60144d499110ba9e48b694e870ab3612fb244
                                            • Opcode Fuzzy Hash: eadf94fe902846e4ba497e3fd5434d707edd5f5ed301daedef8430de467c9a0a
                                            • Instruction Fuzzy Hash: 6221E2B1904204DFDB45DF58D9C0B66BF65FF84324F24C56AED090A267C336E456CAA1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939992146.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_146d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4a5b0805357624192982fe60ff746bb50aadef30bfcc4e9cf496528e1b82ab48
                                            • Instruction ID: 82e7506dba61f5d9a1824c56461563768ce6b784b87ef7960f593ac97fbd11f9
                                            • Opcode Fuzzy Hash: 4a5b0805357624192982fe60ff746bb50aadef30bfcc4e9cf496528e1b82ab48
                                            • Instruction Fuzzy Hash: E8212CB1B04200DFDB15DF54D5C0B26BB69FB84328F24C56ED9894B362C736D446CB62
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939992146.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_146d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 331424b1237f610706f64d8f67b1bfef7e01f6b7dc0068d213b48e7a2f9b1c03
                                            • Instruction ID: 6553360407fb85710a254e8622d31f46d819090242abd7f8ebd5bb7de81bf0c9
                                            • Opcode Fuzzy Hash: 331424b1237f610706f64d8f67b1bfef7e01f6b7dc0068d213b48e7a2f9b1c03
                                            • Instruction Fuzzy Hash: 4B2103B5A04200DFCB15DF58D9C0B26BB69EB8435CF24C56EE98A4B366C336D407CA62
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939992146.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_146d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e3340b136d1263a963f93389aa21519bc1708efdcd1ec8666a931feda77ec1e3
                                            • Instruction ID: 47c2207e9fe0a3eefc7d6f51e9240f65dcb6e4731fc2b24a1f2969ceeae07f84
                                            • Opcode Fuzzy Hash: e3340b136d1263a963f93389aa21519bc1708efdcd1ec8666a931feda77ec1e3
                                            • Instruction Fuzzy Hash: 612183755093808FD713CF24D590716BF71EB46218F28C5DBD8898B667C33A980ACB62
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939773765.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_145d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                            • Instruction ID: 3c306642d7b8b4503d1aea07236b8d12aeb381186687e8f4ae84ead8d436ff69
                                            • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                            • Instruction Fuzzy Hash: 2011CD72804240CFDB16CF44D9C0B56BF62FB84224F24C2AADD090A667C33AE45ACBA1
                                            Memory Dump Source
                                            • Source File: 0000000A.00000002.1939992146.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_10_2_146d000_kOtBoy.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                            • Instruction ID: 1b056a910a3cca9274dcd4a358f47c7656209acf4a005983385417d92504b85f
                                            • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                                            • Instruction Fuzzy Hash: D6118E75A04240DFDB16CF54D5C4B16BB61FB84228F28C6AAD8494B766C33AD44ACB52

                                            Execution Graph

                                            Execution Coverage:12.3%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:19
                                            Total number of Limit Nodes:4
                                            execution_graph 28028 1080848 28030 108084e 28028->28030 28029 108091b 28030->28029 28032 1081380 28030->28032 28033 1081396 28032->28033 28034 1081480 28033->28034 28036 1087090 28033->28036 28034->28030 28037 108709a 28036->28037 28038 10870b4 28037->28038 28041 604cf87 28037->28041 28046 604cf98 28037->28046 28038->28033 28043 604cf98 28041->28043 28042 604d1c2 28042->28038 28043->28042 28044 604d5f0 GlobalMemoryStatusEx 28043->28044 28045 604d5b8 GlobalMemoryStatusEx 28043->28045 28044->28043 28045->28043 28048 604cfad 28046->28048 28047 604d1c2 28047->28038 28048->28047 28049 604d5f0 GlobalMemoryStatusEx 28048->28049 28050 604d5b8 GlobalMemoryStatusEx 28048->28050 28049->28048 28050->28048
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 37bbee2348e5cb0c130f3585bfe6acc996ae495dc289ea30efbfab92b80ec31e
                                            • Instruction ID: c10d5173d54462682c5e74a8e7f8d795c3cc9eeb9eb0424799cd32c76d00dd51
                                            • Opcode Fuzzy Hash: 37bbee2348e5cb0c130f3585bfe6acc996ae495dc289ea30efbfab92b80ec31e
                                            • Instruction Fuzzy Hash: 47630A31D14B1A8ADB51EF68C9805E9F7B1FF99300F11C79AE49877121EB70AAD4CB81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c0e624533bd015995169bec5b536cbba19afabb28d655e1e3d205537c216cfd5
                                            • Instruction ID: 380e2ba47e151fe5ba08e032039c9ff8f4ae67561fdce19f02d22f23a6cb44fe
                                            • Opcode Fuzzy Hash: c0e624533bd015995169bec5b536cbba19afabb28d655e1e3d205537c216cfd5
                                            • Instruction Fuzzy Hash: A3328E34A042058FDB54EFA8D584AAEBBF2EF88314F108469E949EB395DB35DC41CB90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89852933be2567bc2fd980296a7144d277114be8d17b6ae074e65690a60c03d7
                                            • Instruction ID: b1e834db13cb994ab80a44ad7bfcb68a3e933feffa5da05bb1e6c9ddbf158bfe
                                            • Opcode Fuzzy Hash: 89852933be2567bc2fd980296a7144d277114be8d17b6ae074e65690a60c03d7
                                            • Instruction Fuzzy Hash: 47B15E70E0431A8FDB50EFA9C9817DDBBF2AF88314F148529D895EB254EB749845CB81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d2ddd05b0fca810e051825144dfc859e9792ac42a66e4c5378b9dbb8e72fb41b
                                            • Instruction ID: 73320da1ba69adf0e6a9fe2202840e8b52575424a80058d2bba0ee3786c434a1
                                            • Opcode Fuzzy Hash: d2ddd05b0fca810e051825144dfc859e9792ac42a66e4c5378b9dbb8e72fb41b
                                            • Instruction Fuzzy Hash: 5B915A70E0420A8FDF50DFA9C9857DEBBF2BF98714F148129E485EB254EB749846CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2166 1086ed8-1086f42 call 1086c40 2175 1086f5e-1086f8c 2166->2175 2176 1086f44-1086f5d call 108638c 2166->2176 2181 1086f8e-1086f91 2175->2181 2183 1086fcd-1086fd0 2181->2183 2184 1086f93-1086fc8 2181->2184 2185 1086fe0-1086fe3 2183->2185 2186 1086fd2 2183->2186 2184->2183 2187 1086fe5-1086ff9 2185->2187 2188 1087016-1087019 2185->2188 2209 1086fd2 call 1087908 2186->2209 2210 1086fd2 call 1087918 2186->2210 2211 1086fd2 call 10880f1 2186->2211 2197 1086ffb-1086ffd 2187->2197 2198 1086fff 2187->2198 2189 108701b-1087022 2188->2189 2190 108702d-108702f 2188->2190 2193 1087028 2189->2193 2194 10870eb-10870f1 2189->2194 2195 1087031 2190->2195 2196 1087036-1087039 2190->2196 2191 1086fd8-1086fdb 2191->2185 2193->2190 2195->2196 2196->2181 2199 108703f-108704e 2196->2199 2200 1087002-1087011 2197->2200 2198->2200 2202 1087078-108708d 2199->2202 2203 1087050-1087053 2199->2203 2200->2188 2202->2194 2206 108705b-1087076 2203->2206 2206->2202 2206->2203 2209->2191 2210->2191 2211->2191
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq$LRfq
                                            • API String ID: 0-2141892265
                                            • Opcode ID: 7b7e1517294ac4edeedc7e72ee19edd019b06abfc641b64922b5df481066e872
                                            • Instruction ID: 65823ab2a5d866123f445ae942d73035290bb774924444f8fee690e4ee8c21ca
                                            • Opcode Fuzzy Hash: 7b7e1517294ac4edeedc7e72ee19edd019b06abfc641b64922b5df481066e872
                                            • Instruction Fuzzy Hash: 7251F530B042198FDB16EF78D85079EBBB5EF86300F208569E485EB296DB75DC42CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2397 604e280-604e282 2398 604e284 2397->2398 2399 604e289-604e2c6 2397->2399 2400 604e286 2398->2400 2401 604e24d-604e269 2398->2401 2403 604e2ce-604e2fc GlobalMemoryStatusEx 2399->2403 2400->2399 2409 604e26f-604e27f 2401->2409 2410 604e26b-604e26e 2401->2410 2404 604e305-604e32d 2403->2404 2405 604e2fe-604e304 2403->2405 2405->2404
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0604E202), ref: 0604E2EF
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2997488416.0000000006040000.00000040.00000800.00020000.00000000.sdmp, Offset: 06040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_6040000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: 792123be9dd19a631fa7205556fc16c95e1d016c7004930da815d776fafb87e7
                                            • Instruction ID: cbb79f2ca518a830b647b2364f9d24ba0b4a2c2fc73bcd6544b95f1263c6f40b
                                            • Opcode Fuzzy Hash: 792123be9dd19a631fa7205556fc16c95e1d016c7004930da815d776fafb87e7
                                            • Instruction Fuzzy Hash: 7E2198B1C0021A9FDB60DFAAD54579EFBF4BF48320F14812AD818B7240E7789940CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2412 604d5ac-604e2fc GlobalMemoryStatusEx 2416 604e305-604e32d 2412->2416 2417 604e2fe-604e304 2412->2417 2417->2416
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0604E202), ref: 0604E2EF
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2997488416.0000000006040000.00000040.00000800.00020000.00000000.sdmp, Offset: 06040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_6040000_RegSvcs.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: d70b4605114d5fb27730ed1c7524b0dc39310b882de7f3723820db288c864328
                                            • Instruction ID: adc74f35b7b703fa8441c56ca073faf95e435f699573764e875a52c156b3ca9b
                                            • Opcode Fuzzy Hash: d70b4605114d5fb27730ed1c7524b0dc39310b882de7f3723820db288c864328
                                            • Instruction Fuzzy Hash: BC1106B1C0065A9BDB10DF9AC544B9EFBF4FF48320F14816AE918B7240D778A940CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHfq
                                            • API String ID: 0-2154135885
                                            • Opcode ID: 704eef4594f68f1e27b149ba51025a4902af0b9abcf940588a17b4ff57c1b4a0
                                            • Instruction ID: 73c169dcf3d2665ec1f1fce8990b44f55e699a81357023d9fb3e353bee884f58
                                            • Opcode Fuzzy Hash: 704eef4594f68f1e27b149ba51025a4902af0b9abcf940588a17b4ff57c1b4a0
                                            • Instruction Fuzzy Hash: A431E7307042028FDB19AB38D5946AE7BF2AF89210F1444ADE486DB39ADF35CC42CBD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHfq
                                            • API String ID: 0-2154135885
                                            • Opcode ID: 4b39574a1cf0e379013581061553a9511c36be611c117325087b350c7b962ec4
                                            • Instruction ID: 44844d445fe4ee47785887621a0a92be5a13210dc90f66230884972afba79421
                                            • Opcode Fuzzy Hash: 4b39574a1cf0e379013581061553a9511c36be611c117325087b350c7b962ec4
                                            • Instruction Fuzzy Hash: DA31E430B042068BDB19AB38D55476E7BF2AF89200F109469E486EB399DF35DC42CBD0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq
                                            • API String ID: 0-2333822924
                                            • Opcode ID: ae3d28f70d7cffbee243879ab0ba9ec9e2ee6d1cc2ef149f909e89abfcb01850
                                            • Instruction ID: 7e3de4fdc044723952d2aa19c1ea22c455432672b2586df2243de2a3d879cd23
                                            • Opcode Fuzzy Hash: ae3d28f70d7cffbee243879ab0ba9ec9e2ee6d1cc2ef149f909e89abfcb01850
                                            • Instruction Fuzzy Hash: 5631AF34E10209CBDB25DF68D54479EB7B5FF85300F208569F481EB285EB71A842CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRfq
                                            • API String ID: 0-2333822924
                                            • Opcode ID: b202373f60a7bdb3e710890fc13fe2de955142baa86a917af88139fb08ea5321
                                            • Instruction ID: 2261a6db4bab2400cf83c461e5ba42035ba1c1370c69e3a3e1421e0bf9466f95
                                            • Opcode Fuzzy Hash: b202373f60a7bdb3e710890fc13fe2de955142baa86a917af88139fb08ea5321
                                            • Instruction Fuzzy Hash: F92127716083519FC716AB38D0502AA7BF5EF86310F1185EED045CB2A6EF798C46CB91
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 55f4c86806b110088c890263fbd176c70c77d78094e5156ae821c239ef285d5d
                                            • Instruction ID: a0a2ffdfe51803bdf7cc2bf173c1221e735c149f38673d85e3659f8e73fc9f89
                                            • Opcode Fuzzy Hash: 55f4c86806b110088c890263fbd176c70c77d78094e5156ae821c239ef285d5d
                                            • Instruction Fuzzy Hash: 32127D347041018BCB5AAB38E48A62C7BE6EB89304F609D2DE149DB35ACF75DC429F95
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d98789ead3073e337cc804c29c809ff02232df78ec6b46b6d11ad6b79dada89
                                            • Instruction ID: b333c91f3b7034eb5161043713b9853064e751353d7e8cf20cd64e47fafb1f15
                                            • Opcode Fuzzy Hash: 3d98789ead3073e337cc804c29c809ff02232df78ec6b46b6d11ad6b79dada89
                                            • Instruction Fuzzy Hash: 98126E347041018BCB5AAB3CE48A62C7BE6EB89304F609D2DE149DB35ACF75DC429F95
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 63310b2f853fa0756eca231339780c936867098c9c076eb7742ca511f6354266
                                            • Instruction ID: 1a2e50e4578abf112d087e57f7081f75df13098f61a0960e80a95215542f7565
                                            • Opcode Fuzzy Hash: 63310b2f853fa0756eca231339780c936867098c9c076eb7742ca511f6354266
                                            • Instruction Fuzzy Hash: 1EC1F671B042169FDB55EB78C980A6EBBB6EF84310F148569D585CB296CB31EC42C790
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c926bb393ed87e27e86298bac59c234423b951f27cce1daae484d83555eea8c
                                            • Instruction ID: 427b9a421d5ca0e29bf0768e93e929629e25f452fa4bbe47f1d919c899caec24
                                            • Opcode Fuzzy Hash: 7c926bb393ed87e27e86298bac59c234423b951f27cce1daae484d83555eea8c
                                            • Instruction Fuzzy Hash: 7DA15B70E0421A8FDB50EFA9C9817DDBFF1AF88354F148129D898EB254EB749885CF81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7faa7008a27eb901f2fa51b312e86d038f11c73245fbe83d224fa194e584eb9
                                            • Instruction ID: 8494b97a89ae4cd1829a370914473df32e7fcd683215e890b7c7a3b4add230da
                                            • Opcode Fuzzy Hash: d7faa7008a27eb901f2fa51b312e86d038f11c73245fbe83d224fa194e584eb9
                                            • Instruction Fuzzy Hash: E5A14A70E0420A8FDF50DFA8C9857DEBBF2BF98714F148129E485EB254EB749846CB81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e6aedab523750c0c87525babe6095df2da2a58232215c0160ca3a5569ca901a
                                            • Instruction ID: 5452904cf6f3c413822a04dbf8268b30d317a58d29e4382e8492ba4d95d9d3e4
                                            • Opcode Fuzzy Hash: 3e6aedab523750c0c87525babe6095df2da2a58232215c0160ca3a5569ca901a
                                            • Instruction Fuzzy Hash: B2917E34B042158FDB55EF68D584AAEBBF2EF88314F148469E846EB3A5DB31DC42CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fd0e845068b89e5f23607c635cd9a8d8dae3078db8cb41114ac73a520347542b
                                            • Instruction ID: 5a714ff755fc5df612d5ddc945d028afa5a940c777d91710a4663e31bc101701
                                            • Opcode Fuzzy Hash: fd0e845068b89e5f23607c635cd9a8d8dae3078db8cb41114ac73a520347542b
                                            • Instruction Fuzzy Hash: 09716BB0E0424ACFDB50DFA9C9807DEFBF2AF88314F148129E495EB254EB749841CB95
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d531831bf4cbb8938117973ea39ec42080690628be35d53ec3e7eb74d082837
                                            • Instruction ID: 09eafc43d4e2b71c4145e2a78f869ac90eeda7753cc366be088426b9d2f3ce19
                                            • Opcode Fuzzy Hash: 7d531831bf4cbb8938117973ea39ec42080690628be35d53ec3e7eb74d082837
                                            • Instruction Fuzzy Hash: 2A7169B0E0424ACFDB50DFA9C9817DEFBF2AF88314F148129E495EB254EB749841CB95
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7091559d869836c9e438cde93b2edee6228a8746c935c59e1c90f32a639be786
                                            • Instruction ID: ebf43359464e4b8b5cf7f90b7a3673b4c04a102df43c084f4a4042a761753b10
                                            • Opcode Fuzzy Hash: 7091559d869836c9e438cde93b2edee6228a8746c935c59e1c90f32a639be786
                                            • Instruction Fuzzy Hash: 9A512370D143188FDB14EFA9C884B9DBBF1BF48310F158169E899BB391D775A844CB91
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47f9c9779d87a63a0c482e71b4dd30590e5c79a90b8398aacffa49593402fe92
                                            • Instruction ID: 3730494397cdbbab7fe104ac0f78ae60e5cf0b356c464e9184b4df0305dcf6d7
                                            • Opcode Fuzzy Hash: 47f9c9779d87a63a0c482e71b4dd30590e5c79a90b8398aacffa49593402fe92
                                            • Instruction Fuzzy Hash: 8D512370D042188FDB18EFA9C884B9DBBF1BF48310F158129E899BB395DB75A844CF90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35d884bf25b07bf0b4f79db21d84bb2929e4eb8e56b4f3106ae7083aa1a73f41
                                            • Instruction ID: 7495e8023b36a3bade06e1a7dc3aba458634e74e5be300e5c2aa8d4400e404c4
                                            • Opcode Fuzzy Hash: 35d884bf25b07bf0b4f79db21d84bb2929e4eb8e56b4f3106ae7083aa1a73f41
                                            • Instruction Fuzzy Hash: BF5100702152CA8FC70AFB7DF988B553FB5FB923087066969E100DB27ADA207D49DB41
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 55c0a1b6436f4da42427fedc136cb606eb3a4abff0dd19fc752eed1bf73ce1fb
                                            • Instruction ID: a719f650ddffd0babe155ab0a1d7051978adb56ff7658fbb72f4589feb67531f
                                            • Opcode Fuzzy Hash: 55c0a1b6436f4da42427fedc136cb606eb3a4abff0dd19fc752eed1bf73ce1fb
                                            • Instruction Fuzzy Hash: 78418834B04206CBDF61BAA9D98067EB7B2FBC5214F200869D58AE7299D634EC418B81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 078e279ed87694f9b38de3d4babdfbb698af9770870b64e08aaa222b8815a1ae
                                            • Instruction ID: f9bb1e3163d7b656ed98ce9a5851474629aa833b191758b0ae33bbb23fb6a224
                                            • Opcode Fuzzy Hash: 078e279ed87694f9b38de3d4babdfbb698af9770870b64e08aaa222b8815a1ae
                                            • Instruction Fuzzy Hash: AE51ED702151CA8FC709FB7DF988B553FA9FB92308702A969E100EB279DA207D49CB41
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: abeacd15e9a381b72ebaabd5c4e9add9cfc64857178f6ea38fe95a9efb9a6652
                                            • Instruction ID: 3d367c941e56bd36267ac76f46cc4c41afcc430cf91a70b0a35cf07660b856de
                                            • Opcode Fuzzy Hash: abeacd15e9a381b72ebaabd5c4e9add9cfc64857178f6ea38fe95a9efb9a6652
                                            • Instruction Fuzzy Hash: D241DDB0D00249DFDB14DFA9C580ADEBBF5AF58310F20802AE849AB254DB75A945CB90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0d2c58c55ebc5ec59ff30ce1b061e85b85275b1c33967e0e29a57890ce6eaf5
                                            • Instruction ID: 70cb58e1f59dc857c32040f8e7062e342c9fdbe39026c7aec6fbc676bef36f53
                                            • Opcode Fuzzy Hash: a0d2c58c55ebc5ec59ff30ce1b061e85b85275b1c33967e0e29a57890ce6eaf5
                                            • Instruction Fuzzy Hash: 6F316234E142069BCB19DFA8D55469EB7F6BF89300F10C919E846EB754DB70AC42CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bf9efc0cbdeec8dd4cb901673771b38650bb25f5df64777df01aab7e8f8cb770
                                            • Instruction ID: f6e081a49135ff799556cdc78a9000a9395b1367ff925b8323a1ee2c8ea502a3
                                            • Opcode Fuzzy Hash: bf9efc0cbdeec8dd4cb901673771b38650bb25f5df64777df01aab7e8f8cb770
                                            • Instruction Fuzzy Hash: 0C41EEB0D00349DFDB10DFA9C980A9EBFF5FF48310F20802AE849AB254DB75A945CB90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea3f8ec974030bdb152fe7d4f104c79f0e317f25a5bde8dd5e20ea2c7e38eff1
                                            • Instruction ID: beb7bda8302045794b12833b452ab98c6364183d7752deee1fc29942de763db3
                                            • Opcode Fuzzy Hash: ea3f8ec974030bdb152fe7d4f104c79f0e317f25a5bde8dd5e20ea2c7e38eff1
                                            • Instruction Fuzzy Hash: F6316138E142069BCB09DFB8D59469EB7F6BF89300F10C919E846EB754DB70AC42CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09791b244de42abbc1c9525754c2d5b4493ef5f284a391411b90a2fbb1ea98c4
                                            • Instruction ID: cd3048506ddc599c8b311e0c4c2894f53514436220697917ba0abc38070ad35c
                                            • Opcode Fuzzy Hash: 09791b244de42abbc1c9525754c2d5b4493ef5f284a391411b90a2fbb1ea98c4
                                            • Instruction Fuzzy Hash: 21319331E042059BCB09EFA8D9807AEF7B2FF89304F14C569E445EB355DB719882CB90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09d54e63ac8f8b7c778f5ee22db8fddf3006f1e60d7c8b39e03a9e49e720bff8
                                            • Instruction ID: ed1d03b732045ca5088bf5e7052e43f96bc7026918852568668c56d00e4def99
                                            • Opcode Fuzzy Hash: 09d54e63ac8f8b7c778f5ee22db8fddf3006f1e60d7c8b39e03a9e49e720bff8
                                            • Instruction Fuzzy Hash: 24218230E042099BDF05EFA9D5806AEF7B2FF89304F10C559E845EB255DB719842CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee40cb0b8f3d26864a11f6d6be0ede35e04ac89551294bc4a6a6b59697e2bebf
                                            • Instruction ID: a8afe1aded29e088dd10b40332c832e915571a40ca7899c89777fcd964b3fdca
                                            • Opcode Fuzzy Hash: ee40cb0b8f3d26864a11f6d6be0ede35e04ac89551294bc4a6a6b59697e2bebf
                                            • Instruction Fuzzy Hash: 5421B234E082069BCB19EFA8D8545EEB7B2AF89304F10855AE895F7350EB709D46CB50
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f2f1a0ad322ba717d2ff12c29ab8eefbf8958d854e33e22da3a7c90f50008dc
                                            • Instruction ID: c63fdad4a10aa757f5dd036272ba1d2cbcb355d32d2c72e6ce13e7acd2cd35ab
                                            • Opcode Fuzzy Hash: 5f2f1a0ad322ba717d2ff12c29ab8eefbf8958d854e33e22da3a7c90f50008dc
                                            • Instruction Fuzzy Hash: 9721D3746041818FDF63FBACF88875937A5FB45318F111AA9E087C726ADA348C828B91
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2a1baf8879ade5217e5ce575eceb5325eb855d044bcc9a42e59ca6a9c9c6f45
                                            • Instruction ID: 93c0d74c165508f6f5e60b735ecff97c26c52a5f4848998634befee57e4a00db
                                            • Opcode Fuzzy Hash: c2a1baf8879ade5217e5ce575eceb5325eb855d044bcc9a42e59ca6a9c9c6f45
                                            • Instruction Fuzzy Hash: C4213534704245CFCB64EB78C99879D7BF1AF88204F2004A9E586EB3A5EB369D01CF90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2986525183.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_e3d000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c4c11ff386722b598ef5890d07e4dbc0eedbab83767938439e2d3c5e69d5c361
                                            • Instruction ID: 6731f9e9d9edea34848d6205bd694862f6d0abb12f06eb1a114d7a154760426f
                                            • Opcode Fuzzy Hash: c4c11ff386722b598ef5890d07e4dbc0eedbab83767938439e2d3c5e69d5c361
                                            • Instruction Fuzzy Hash: 482107B5508200DFCB18DF14E9C8B26BF66FB84718F24C56DE94A5B296C336D847CE61
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9eb79b52d24619b0a8fbe4f7f41b91261e2e40a4f9a2a4789f8a565dbee89470
                                            • Instruction ID: b523832a29c070a2eda2874ea7d0c768811cd8a23bed6dece52ccef0ab14d876
                                            • Opcode Fuzzy Hash: 9eb79b52d24619b0a8fbe4f7f41b91261e2e40a4f9a2a4789f8a565dbee89470
                                            • Instruction Fuzzy Hash: 6521C370A092414FDB77777CF4987293BA1EF42315F1019A9E4CADB2D7DA3988868742
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 67ba04e6c9720d99a6570f917680f5f8112499c22406b72522e921a5593e9686
                                            • Instruction ID: 840ce0541e8b0150c2154860a218696fd064f8e62dc0894e3f9aa378615c7865
                                            • Opcode Fuzzy Hash: 67ba04e6c9720d99a6570f917680f5f8112499c22406b72522e921a5593e9686
                                            • Instruction Fuzzy Hash: EE219A30B08255CFDB65EB78C5147ED7BF2AF49200F1004A9D1C6EB291EB369D42CBA1
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d6553b0591d02eb55a2f520822b14ea40adef47cda8a814ebef19dbc3547c177
                                            • Instruction ID: fe544d8f98b5cd27b56dab9e5e73f21268195bda64dc3e4b879c57affdd88f9c
                                            • Opcode Fuzzy Hash: d6553b0591d02eb55a2f520822b14ea40adef47cda8a814ebef19dbc3547c177
                                            • Instruction Fuzzy Hash: 8421C671B141158FDB14EB69C954BAEBBF6FFC8714F108065E545EB3A4DAB19C00C790
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 783aaf7aa16d402ddee02eff9d2bd905fe6ea0cfbaae1217ab8fc7581e494885
                                            • Instruction ID: 9b5b0676c889a81faa2135e91c8a775a73807d339f0d5e5b024864e86ce3241a
                                            • Opcode Fuzzy Hash: 783aaf7aa16d402ddee02eff9d2bd905fe6ea0cfbaae1217ab8fc7581e494885
                                            • Instruction Fuzzy Hash: A921C534E0420A9BCF19EFA4C5545EEF7B2AF89304F10C56AE855F7344DB709845CB40
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d3fcf401ab061fc3a72bd825c008bc25ce196a772ea21876b370f830801e7306
                                            • Instruction ID: 045974a7b36a897afe8090349e45f0efb15e878ad80026fcbcaf10a8153bcca4
                                            • Opcode Fuzzy Hash: d3fcf401ab061fc3a72bd825c008bc25ce196a772ea21876b370f830801e7306
                                            • Instruction Fuzzy Hash: B0212730B04215CFDB64EA78C5546AE77F6AF49205F1004A9D186EB294EB369D42CBA1
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 11d2401b714dacce57d31ecd05bf028acd305e284a34237a452df36b4018eef5
                                            • Instruction ID: b7307f81ab185d2861498e976f2f3dab3287325add1cc95a637939b6377067ce
                                            • Opcode Fuzzy Hash: 11d2401b714dacce57d31ecd05bf028acd305e284a34237a452df36b4018eef5
                                            • Instruction Fuzzy Hash: 0D21C0386041818FDF67F76CF888B1937A9FB45318F115A69E086C726ADA34DC828B91
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cae55f5e31893a6fcc2675ad6797f9b6d428e4a0cf595eb13be817736ce5b1ab
                                            • Instruction ID: faa586fb571fa0578fcd614477fe8a8e7c8dd0baaff23fb073e2ed82fa69252f
                                            • Opcode Fuzzy Hash: cae55f5e31893a6fcc2675ad6797f9b6d428e4a0cf595eb13be817736ce5b1ab
                                            • Instruction Fuzzy Hash: 2E213634700205CFCB64EB78C998AAD77F2EF48204F1004A9E586EB3A9DB369D01CB90
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2986525183.0000000000E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E3D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_e3d000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35c48c506a4c4e13381858dcd3876f39acdfcf6e635e54b6bbd9679e733c4b42
                                            • Instruction ID: a3f30cec72322a5ed813c1c3334c2593bf0328eac6320e77628a3ba085e94455
                                            • Opcode Fuzzy Hash: 35c48c506a4c4e13381858dcd3876f39acdfcf6e635e54b6bbd9679e733c4b42
                                            • Instruction Fuzzy Hash: 822171755093808FC716CF24D994715BF72EB46214F28C5DAD8498B6A7C33A980ACB62
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd225b21112ddeb2d459b1cbaab0c22c21511c268da578ff1858d75748f08462
                                            • Instruction ID: 3c9c4db0ad59734efe82e0c177042895612a359101645c016bed5371a6e263ac
                                            • Opcode Fuzzy Hash: dd225b21112ddeb2d459b1cbaab0c22c21511c268da578ff1858d75748f08462
                                            • Instruction Fuzzy Hash: 8211A730A19205CBEFA676B8D4443693791EB41214F1449B9F4C6DB29BEA24CDC94BD2
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eb20037351d0b10c7100d1d4fe38127e5b5b78e991d1bae2f081291a51155d6f
                                            • Instruction ID: 8e66fa83bf348640d330b1140658741051f0e4e20bc20be73e75096a6e6e94a6
                                            • Opcode Fuzzy Hash: eb20037351d0b10c7100d1d4fe38127e5b5b78e991d1bae2f081291a51155d6f
                                            • Instruction Fuzzy Hash: DC118230B18204CBEFA6B6BCD4487293291EB45214F1089B9F4C6CF25ADA21CCC95FD1
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a957fa4283526ca8d07055e498d5ba112e4de2f749c7960e3b5ac56ca13d9c34
                                            • Instruction ID: 2046e8fd69af98d0e51ca26db83730457ccf87e7228aa35b2b1cad3b890af179
                                            • Opcode Fuzzy Hash: a957fa4283526ca8d07055e498d5ba112e4de2f749c7960e3b5ac56ca13d9c34
                                            • Instruction Fuzzy Hash: 2C11D030A04145DFDB45FBA8F98579D7BB1EB40304F108A6EE004DB2A5EF319E458B81
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b9d763fb826423d8fe75ea66c71e13cc154288e8fba3858cd0ac8de952f4797d
                                            • Instruction ID: afbfe8240298b1bfdd263fbb32643a6341a0caea1030dfdab76e7937a7680a82
                                            • Opcode Fuzzy Hash: b9d763fb826423d8fe75ea66c71e13cc154288e8fba3858cd0ac8de952f4797d
                                            • Instruction Fuzzy Hash: D9112E31A043159FCB61FFBC94501EEBBF5EF58260F1445BAD885E7206DB35C8428BA5
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fd9493add9c4b027dd686cf5b7ab25db56a23973cb23620e5f34390a5b95f64e
                                            • Instruction ID: 6c9a86b92564d43b74995f65b50ca60e499058d40992b2ca2cb8e171955c825e
                                            • Opcode Fuzzy Hash: fd9493add9c4b027dd686cf5b7ab25db56a23973cb23620e5f34390a5b95f64e
                                            • Instruction Fuzzy Hash: 3111C675F002118FCF61BBB9A90C35E7BF9BB88254F100669D98AD3349E73499418780
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5cb40a37a0ed9d90fad8556df66337a798aef6018dee2f2dd29c41b68b931268
                                            • Instruction ID: 247d012c27cfa399fa9045c3fd6fad1b0724b30d6986b234df7aae2d4e86c341
                                            • Opcode Fuzzy Hash: 5cb40a37a0ed9d90fad8556df66337a798aef6018dee2f2dd29c41b68b931268
                                            • Instruction Fuzzy Hash: C1012D31A042159FCB61FFBD84502AEBBE5EF58220F1444BAD885E7306EA35C8428BA5
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 852131cdbfa5b63259cbf90b5263ebcb3d3c632fe813ffa5e15ab422bb2891e1
                                            • Instruction ID: a46f0c9ea672ce4d47ba2f55d3d7fcd702b91d4b39c086457536e647d613492b
                                            • Opcode Fuzzy Hash: 852131cdbfa5b63259cbf90b5263ebcb3d3c632fe813ffa5e15ab422bb2891e1
                                            • Instruction Fuzzy Hash: 9201B531A001048BDB44EF99D98479ABBA5FFC4310F54C568D84C6F29AEBB0A945CBA1
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9832569df9bf813d45b685c8118dc77c1c1c638358eecc200164aeb5329b306f
                                            • Instruction ID: 7e9136564bbf38b4fdebe82c6a429ef63ffdb57df3dcdb6f2254319f2c933ccf
                                            • Opcode Fuzzy Hash: 9832569df9bf813d45b685c8118dc77c1c1c638358eecc200164aeb5329b306f
                                            • Instruction Fuzzy Hash: 93F02B73A0C110DFDB22ABAC94901ACBFA1FE6412171C40D7D4C6DB216D735D443C761
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 923f596f19dff5d92ddd2fc97913ffd56691903c9830392ab324b55ee726caf7
                                            • Instruction ID: c6db7ba23ceaae5ab98e1e8f7d6241b811b8c001b41ca1b0006b90bb92194201
                                            • Opcode Fuzzy Hash: 923f596f19dff5d92ddd2fc97913ffd56691903c9830392ab324b55ee726caf7
                                            • Instruction Fuzzy Hash: 62F0C939B00104CFCB14DB74D598B6C77B2EF88715F5141A9E5069B3A9DB31AD42CF40
                                            Memory Dump Source
                                            • Source File: 00000012.00000002.2988172113.0000000001080000.00000040.00000800.00020000.00000000.sdmp, Offset: 01080000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_18_2_1080000_RegSvcs.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f96879dab2db6db5fd8bd8064d4ff2fb9ce1c899fff12b34178c4acfbb3d2cc2
                                            • Instruction ID: 960b76851a11468d1a1c61de466dedec26346273e29e4f3dfa7e5408f0323d9b
                                            • Opcode Fuzzy Hash: f96879dab2db6db5fd8bd8064d4ff2fb9ce1c899fff12b34178c4acfbb3d2cc2
                                            • Instruction Fuzzy Hash: A0F03C74900149EFCB09FBF8F980A9D7BB1EB40304F509A68D404A72A8EF312F549B91