Loading ...

Play interactive tourEdit tour

Analysis Report y3t4g48gj6_PAYMENT.exe

Overview

General Information

Sample Name:y3t4g48gj6_PAYMENT.exe
Analysis ID:411524
MD5:9998f7e0c708ba1fa4b56235a9811c0f
SHA1:e3810d21600bb0113b2d7116347326beb6a35d83
SHA256:9f44f33f1b0b724292959b65ae6f2918cb1993641ad7832ffdbd68fc00fdda2c
Infos:

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Creates an autostart registry key pointing to binary in C:\Windows
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Non Interactive PowerShell
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • y3t4g48gj6_PAYMENT.exe (PID: 6928 cmdline: 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
    • powershell.exe (PID: 1376 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6328 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • powershell.exe (PID: 6824 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 7080 cmdline: 'C:\Windows\System32\cmd.exe' /c timeout 1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 7052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 808 cmdline: timeout 1 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • y3t4g48gj6_PAYMENT.exe (PID: 6280 cmdline: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
    • WerFault.exe (PID: 6568 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 6252 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1576 cmdline: 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
  • svchost.exe (PID: 6336 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4296 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 1368 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 6476 cmdline: 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' MD5: 9998F7E0C708BA1FA4B56235A9811C0F)
  • svchost.exe (PID: 6252 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5148 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x3bf37d:$x1: NanoCore.ClientPluginHost
  • 0x3bf3ba:$x2: IClientNetworkHost
  • 0x3c2eed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x3bf0e5:$a: NanoCore
    • 0x3bf0f5:$a: NanoCore
    • 0x3bf329:$a: NanoCore
    • 0x3bf33d:$a: NanoCore
    • 0x3bf37d:$a: NanoCore
    • 0x3bf144:$b: ClientPlugin
    • 0x3bf346:$b: ClientPlugin
    • 0x3bf386:$b: ClientPlugin
    • 0x3bf26b:$c: ProjectData
    • 0x3bfc72:$d: DESCrypto
    • 0x3c763e:$e: KeepAlive
    • 0x3c562c:$g: LogClientMessage
    • 0x3c1827:$i: get_Connected
    • 0x3bffa8:$j: #=q
    • 0x3bffd8:$j: #=q
    • 0x3bfff4:$j: #=q
    • 0x3c0024:$j: #=q
    • 0x3c0040:$j: #=q
    • 0x3c005c:$j: #=q
    • 0x3c008c:$j: #=q
    • 0x3c00a8:$j: #=q
    Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x37b755:$x1: NanoCore.ClientPluginHost
    • 0x37b7b6:$x2: IClientNetworkHost
    • 0x380bbb:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x38eb2d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928JoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 1 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfef5:$a: NanoCore
        • 0xff05:$a: NanoCore
        • 0x10139:$a: NanoCore
        • 0x1014d:$a: NanoCore
        • 0x1018d:$a: NanoCore
        • 0xff54:$b: ClientPlugin
        • 0x10156:$b: ClientPlugin
        • 0x10196:$b: ClientPlugin
        • 0x1007b:$c: ProjectData
        • 0x10a82:$d: DESCrypto
        • 0x1844e:$e: KeepAlive
        • 0x1643c:$g: LogClientMessage
        • 0x12637:$i: get_Connected
        • 0x10db8:$j: #=q
        • 0x10de8:$j: #=q
        • 0x10e04:$j: #=q
        • 0x10e34:$j: #=q
        • 0x10e50:$j: #=q
        • 0x10e6c:$j: #=q
        • 0x10e9c:$j: #=q
        • 0x10eb8:$j: #=q
        0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe38d:$x1: NanoCore.ClientPluginHost
        • 0xe3ca:$x2: IClientNetworkHost
        • 0x11efd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        Click to see the 3 entries

        Sigma Overview

        AV Detection:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        E-Banking Fraud:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        System Summary:

        barindex
        Sigma detected: Non Interactive PowerShellShow sources
        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' , ParentImage: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ParentProcessId: 6928, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force, ProcessId: 1376

        Stealing of Sensitive Information:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Remote Access Functionality:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe, ProcessId: 6280, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpackMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "f8dffc54-5ec5-4013-9de8-d8d85368", "Group": "CODEDBASE", "Domain1": "omaprilcode.duckdns.org", "Domain2": "omaprilcode.duckdns.org", "Port": 8090, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeReversingLabs: Detection: 14%
        Multi AV Scanner detection for submitted fileShow sources
        Source: y3t4g48gj6_PAYMENT.exeReversingLabs: Detection: 14%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: y3t4g48gj6_PAYMENT.exeJoe Sandbox ML: detected
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdbw| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wuser32.pdbi source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdbh source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdbi| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.904094735.00000000015B7000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: Microsoft.CSharp.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: indows.Forms.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdbz source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.CSharp.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: version.pdb.B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shcore.pdb"B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ility.pdbU source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000016.00000003.745706355.00000000027C1000.00000004.00000001.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb6By source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: profapi.pdb<B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: indows.Forms.pdb{{8 source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: ynamic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.pdb; source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdbRSDSD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: oleaut32.pdbB/ source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb|@ source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: CLBCatQ.pdbc| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: .pdb- source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: urlmon.pdb}| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.PDB source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cldapi.pdbq| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbK[G source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb(B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: y3t4g48gj6_PAYMENT.PDBR source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb4 source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: rawing.pdbn source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb=s. source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb8 source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ie.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb% source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Drawing.pdbD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: i8C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbj source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb0B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb{{# source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.745736832.00000000027C7000.00000004.00000001.sdmp
        Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp, WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdb&& source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbk source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49763 -> 194.5.97.75:8090
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49768 -> 194.5.97.75:8090
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorURLs: omaprilcode.duckdns.org
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: omaprilcode.duckdns.org
        Source: global trafficTCP traffic: 192.168.2.4:49747 -> 194.5.97.75:8090
        Source: Joe Sandbox ViewIP Address: 194.5.97.75 194.5.97.75
        Source: Joe Sandbox ViewASN Name: DANILENKODE DANILENKODE
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI", equals www.facebook.com (Facebook)
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI", equals www.twitter.com (Twitter)
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-05-11T09:38:07.3274264Z||.||7e6d3bb3-74bc-4bd2-8463-13ea3a980d3c||1152921505693476823||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 0000001A.00000002.864871330.000001BB1C313000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify Music","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"pandora","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-05-11T09:38:07.3274264Z||.||7e6d3bb3-74bc-4bd2-8463-13ea3a980d3c||1152921505693476823||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku"
        Source: svchost.exe, 0000001A.00000003.843517546.000001BB1C35F000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI", equals www.facebook.com (Facebook)
        Source: svchost.exe, 0000001A.00000003.843517546.000001BB1C35F000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify Music","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI", equals www.twitter.com (Twitter)
        Source: svchost.exe, 0000001A.00000003.822109101.000001BB1C361000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-04-28T14:19:25.9172986Z||.||2e8b091b-9a79-4b36-a1ad-1238cc769fa9||1152921505693355901||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-04-28T14:18:40.1620745Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName":"828B5831.HiddenCityMysteryofShadows","PublisherCertificateName":"CN=A4F05332-BE3A-4155-B996-B100171CD4B1","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"8cb666bc-49d3-4722-bb14-5643aee3a729"},{"IdType":"LegacyWindowsPhoneProductId","Value":"94ad5279-e84a-4d40-b7cf-c6f16f916e6c"},{"IdType":"XboxTitleId","Value":"2124184622"}],"IngestionSourc
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmpString found in binary or memory: !\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","SkuTitle":"Hidden City: Hidden Object Adventure","Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NBLGGH6J6VK","Properties":{"FulfillmentData":{"ProductId":"9NBLGGH6J6VK","WuCategoryId":"e15668ee-9cc1-4bc2-ba76-e91eb1a11e95","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","SkuId":"0011"},"FulfillmentType":null,"FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x86"],"Capabilities":["internetClient"],"ExperienceIds":[],"MaxDownloadSizeInBytes":541214496,"PackageFormat":"EAppxBundle","PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","MainPackageFamilyNameForDlc":null,"PackageFullName":"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6","PackageId":"b3805e6c-7a08-4cff-113c-76cb28cda307-X86","PackageRank":30011,"PlatformDependencies":[{"MaxTested":2814750931222528,"MinVersion":2814750438195200,"PlatformName":"Windows.Xbox"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.bundledPackages\":[\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_x86__ytsefhwckbdv6\"],\"content.isMain\":false,\"content.packageId\":\"828B5831.HiddenCityMysteryofShadows_1.41.4100.70_neutral_~_ytsefhwckbdv6\",\"content.productId\":\"94ad5279-e84a-4d40-b7cf-c6f16f916e6c\",\"content.targetPlatforms\":[{\"platf
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: % Regular free updates with loads of new content\r\n____________________________ \r\n\r\nGame available in: English, French, Italian, German, Spanish, Portuguese, Brazilian Portuguese, Russian, Korean, Simplified Chinese, Traditional Chinese, Japanese, Arabic\r\n____________________________ \r\n\r\nSign up now for a weekly round-up of the best from G5 Games! www.g5e.com/e-mail\r\n____________________________ \r\n\r\nG5 Games - World of Adventures"!!\r\nCollect them all! Search for \"g5\" in Windows Store! \r\n____________________________\r\n\r\nVISIT US: www.g5e.com\r\nWATCH US: www.youtube.com/g5enter\r\nFIND US: www.facebook.com/HiddenCityGame\r\nJOIN US: https://instagram.com/hiddencity_\r\nFOLLOW US: www.twitter.com/g5games\r\nTerms of Service: http://www.g5e.com/termsofservice \r\nG5 End User License Supplemental Terms: http://www.g5e.com/G5_End_User_License_Supplemental_Terms","ProductTitle":"Hidden City: Hidden Object Adventure","SearchTitles":[{"SearchTitleString":"find hidden objects ","SearchTitleType":"SearchHint"},{"SearchTitleString":"junes pearls free ","SearchTitleType":"SearchHint"},{"SearchTitleString":"ispy notes peril","SearchTitleType":"SearchHint"},{"SearchTitleString":"seekers mystery ","SearchTitleType":"SearchHint"},{"SearchTitleString":"detective manor solving","SearchTitleType":"SearchHint"},{"SearchTitleString":"sherlock hotel spot it","SearchTitleType":"SearchHint"},{"SearchTitleString":"puzzle game journey ","SearchTitleType":"SearchHint"}],"Language":"en","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductGame;1","ProductId":"9NBLGGH6J6VK","Properties":{"PackageFamilyName":"828B5831.HiddenCityMysteryofShadows_ytsefhwckbdv6","PackageIdentityName
        Source: svchost.exe, 0000001A.00000003.822109101.000001BB1C361000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","ProductTitle":"Messenger","SearchTitles":[],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9WZDNCRF0083","Properties":{"PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","PackageIdentityName":"FACEBOOK.317180B0BB486","PublisherCertificateName":"CN=6E08453F-9BA7-4311-999C-D22FBA2FB1B8","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"c6a9fa5c-20a2-4e12-904d-edd408657dc8"},{"IdType":"LegacyWindowsPhoneProductId","Value":"3219d30d-4a23-4f58-a91c-c44b04e6a0c7"},{"IdType":"XboxTitleId","Value":"2004208728"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2021-04-28T14:19:25.9172986Z||.||2e8b091b-9a79-4b36-a1ad-1238cc769fa9||1152921505693355901||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailabilities":[{"Sku":{"LastModifiedDate":"2021-04-28T14:18:40.1620745Z","LocalizedProperties":[{"SkuDescription":"Made for big screens and close connections. Get access to free* texting, and high-quality voice & video chat built specifically for desktop.\r\n\r\nMADE FOR DESKTOP, MADE
        Source: svchost.exe, 0000001A.00000003.821971887.000001BB1C359000.00000004.00000001.sdmpString found in binary or memory: t enough.\r\n\r\nSHARE WITH FRIENDS\r\nSend photos and videos to keep your close friends up to speed. Receive files for even more productivity.\r\n\r\n\r\n*Calls are free over Wi-Fi but otherwise standard data charges apply.\r\nPrivacy Policy: https://www.facebook.com/about/privacy | LEARN MORE at: https://messenger.com (https://messenger.com/)","SkuTitle":"Messenger","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9WZDNCRF0083","Properties":{"FulfillmentData":{"ProductId":"9WZDNCRF0083","WuCategoryId":"c6a9fa5c-20a2-4e12-904d-edd408657dc8","PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","SkuId":"0010"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"App"}],"Architectures":["x64"],"Capabilities":["runFullTrust","internetClient","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":140842379,"PackageFormat":"Appx","PackageFamilyName":"Facebook.317180B0BB486_8xx8rvfyw5nnt","MainPackageFamilyNameForDlc":null,"PackageFullName":"FACEBOOK.317180B0BB486_970.11.116.0_x64__8xx8rvfyw5nnt","PackageId":"7f326ffb-6d38-0c43-2776-11d49b129880-X64","PackageRank":30002,"PlatformDependencies":[{"MaxTested":2814750970478592,"MinVersion":2814750438195200,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"FACEBOOK.317180B0BB486_970.11.116.0_x64__8xx8rvfyw5nnt\",\"content.productId\":\"3219d30d-4a23-4f58-a91c-c44b04e6a0c7\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750970478592,\"platform.minVersion\":2814750438195200,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Social\",\"optOut.bac
        Source: unknownDNS traffic detected: queries for: omaprilcode.duckdns.org
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
        Source: powershell.exe, 00000009.00000003.955076797.0000000008E7F000.00000004.00000001.sdmpString found in binary or memory: http://crl.mi&
        Source: powershell.exe, 00000007.00000003.977026096.0000000008F5D000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft.co
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
        Source: svchost.exe, 0000001A.00000002.861868933.000001BB1BACA000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://ocsp.digicert.com0C
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://ocsp.digicert.com0O
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.o
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/locality
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephone
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphone
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovince
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/
        Source: WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.o
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: http://www.digicert.com/CPS0
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/G5_End_User_License_Supplemental_Terms
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: http://www.g5e.com/termsofservice
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/contact/
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://corp.roblox.com/parents/
        Source: svchost.exe, 0000001A.00000002.860682383.000001BB1BA6F000.00000004.00000001.sdmpString found in binary or memory: https://displaycatalog.mp.microsoft
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://en.help.roblox.com/hc/en-us
        Source: powershell.exe, 00000007.00000003.882256216.0000000005A08000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.866423473.0000000005B0D000.00000004.00000001.sdmpString found in binary or memory: https://go.micro
        Source: svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpString found in binary or memory: https://instagram.com/hiddencity_
        Source: y3t4g48gj6_PAYMENT.exeString found in binary or memory: https://www.digicert.com/CPS0
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/develop
        Source: svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpString found in binary or memory: https://www.roblox.com/info/privacy

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: y3t4g48gj6_PAYMENT.exe
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316D2200_2_0316D220
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031689F00_2_031689F0
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031620100_2_03162010
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316EFD00_2_0316EFD0
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031667D80_2_031667D8
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031600060_2_03160006
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031600400_2_03160040
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316BE880_2_0316BE88
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031A00400_2_031A0040
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031A6C390_2_031A6C39
        Source: Joe Sandbox ViewDropped File: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 9F44F33F1B0B724292959B65AE6F2918CB1993641AD7832FFDBD68FC00FDDA2C
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: invalid certificate
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000000.653457414.0000000000DF2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWEMZ Fyj.exe2 vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exe, 0000000F.00000000.720124138.0000000001062000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: y3t4g48gj6_PAYMENT.exeBinary or memory string: OriginalFilenamevalueinfiniteVM.exe@ vs y3t4g48gj6_PAYMENT.exe
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
        Source: classification engineClassification label: mal100.troj.evad.winEXE@31/21@5/1
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20210512Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{f8dffc54-5ec5-4013-9de8-d8d853682f44}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_01
        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6928
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_01
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7052:120:WilError_01
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uckgpted.as3.ps1Jump to behavior
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
        Source: y3t4g48gj6_PAYMENT.exeReversingLabs: Detection: 14%
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile read: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
        Source: unknownProcess created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: unknownProcess created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: y3t4g48gj6_PAYMENT.exeStatic file information: File size 3867176 > 1048576
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3ae400
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: rsaenh.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdbw| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: wntdll.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: ml.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: .ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: clr.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: cryptsp.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: ility.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: advapi32.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Configuration.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wuser32.pdbi source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ntmarta.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: CLBCatQ.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: urlmon.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdbh source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Dynamic.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdbi| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.904094735.00000000015B7000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: Microsoft.CSharp.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: indows.Forms.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscoree.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdbz source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: shlwapi.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.CSharp.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: powrprof.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Configuration.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ole32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: iertutil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.ni.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: msasn1.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: version.pdb.B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shcore.pdb"B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ility.pdbU source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000016.00000003.745706355.00000000027C1000.00000004.00000001.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb6By source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: profapi.pdb<B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: indows.Forms.pdb{{8 source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: Accessibility.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: ynamic.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: apphelp.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.pdb; source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: System.Xml.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: ml.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: WinTypes.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdbRSDSD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Accessibility.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: rawing.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: oleaut32.pdbB/ source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb|@ source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: mscoreei.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscorlib.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: CLBCatQ.pdbc| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: .pdb- source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: urlmon.pdb}| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: shcore.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.PDB source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: System.Core.ni.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: fltLib.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cldapi.pdbq| source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Core.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: shell32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbK[G source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: wimm32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Drawing.pdb; source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: wwin32u.pdb(B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdbT source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: diasymreader.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp
        Source: Binary string: y3t4g48gj6_PAYMENT.PDBR source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\mscorlib.pdb4 source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Windows.StateRepositoryPS.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: rawing.pdbn source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: mscorlib.ni.pdb% source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.ni.pdbT3 source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: profapi.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb=s. source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: WLDP.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb8 source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: sechost.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.ni.pdbRSDS source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: clrjit.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: ie.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: propsys.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: msvcr120_clr0400.i386.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb% source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: System.Configuration.ni.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.Drawing.pdbD source: WER1FC3.tmp.dmp.22.dr
        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.902699297.0000000001535000.00000004.00000020.sdmp
        Source: Binary string: i8C:\Windows\System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.895874203.0000000001187000.00000004.00000001.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbj source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: version.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: onfiguration.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wintrust.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Xml.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: System.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903474283.0000000001584000.00000004.00000020.sdmp
        Source: Binary string: cfgmgr32.pdb0B source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdb source: WerFault.exe, 00000016.00000003.794735478.0000000004BB7000.00000004.00000040.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000016.00000003.797201547.0000000004BA0000.00000004.00000040.sdmp
        Source: Binary string: psapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000016.00000003.795136418.0000000004BD1000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb{{# source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: cldapi.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: mscoreei.pdb source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000016.00000003.745736832.00000000027C7000.00000004.00000001.sdmp
        Source: Binary string: System.Drawing.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: System.Core.pdb source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp, WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: combase.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Windows.Forms.pdbx source: WerFault.exe, 00000016.00000002.883119569.0000000004E00000.00000004.00000001.sdmp
        Source: Binary string: Microsoft.CSharp.pdb&& source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: OneCoreUAPCommonProxyStub.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: Binary string: bcryptprimitives.pdbk source: WerFault.exe, 00000016.00000003.794840386.0000000004BA1000.00000004.00000040.sdmp
        Source: Binary string: Microsoft.VisualBasic.pdb" source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp
        Source: Binary string: wuser32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: System.Core.pdbk source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.903872934.00000000015A3000.00000004.00000020.sdmp
        Source: Binary string: System.ni.pdb source: WerFault.exe, 00000016.00000003.795057871.0000000004BBA000.00000004.00000001.sdmp, WER1FC3.tmp.dmp.22.dr
        Source: Binary string: crypt32.pdb source: WerFault.exe, 00000016.00000003.796928551.0000000004BA8000.00000004.00000040.sdmp
        Source: Binary string: edputil.pdb source: WerFault.exe, 00000016.00000003.794663250.0000000004BAC000.00000004.00000040.sdmp
        Source: y3t4g48gj6_PAYMENT.exeStatic PE information: 0xD9F65925 [Sat Nov 17 01:55:49 2085 UTC]
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_0316D8B0 push cs; iretd 0_2_0316D86B
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03163008 push 4801843Dh; ret 0_2_03163015
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031695F0 push eax; iretd 0_2_031696B8
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_03169420 push edx; iretd 0_2_03169462
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeCode function: 0_2_031AD9C0 push esp; retf 0_2_031AD9C1

        Persistence and Installation Behavior:

        barindex
        Drops PE files with benign system namesShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file
        Drops executables to the windows directory (C:\Windows) and starts themShow sources
        Source: unknownExecutable created and started: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile created: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeJump to dropped file

        Boot Survival:

        barindex
        Creates an autostart registry key pointing to binary in C:\WindowsShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5Jump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Tries to delay execution (extensive OutputDebugStringW loop)Show sources
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeSection loaded: OutputDebugStringW count: 135
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeSection loaded: OutputDebugStringW count: 115
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL/WINE_GET_UNIX_FILE_NAMEQEMU
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLUSER
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3801Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3205Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4065Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2548Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4410Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2466Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: threadDelayed 3735
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: threadDelayed 5170
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeWindow / User API: foregroundWindowGot 574
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe TID: 6932Thread sleep count: 100 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4648Thread sleep time: -3689348814741908s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4648Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6692Thread sleep count: 4065 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6804Thread sleep count: 2548 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7120Thread sleep count: 52 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2228Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6776Thread sleep count: 4410 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6708Thread sleep count: 2466 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7060Thread sleep count: 60 > 30Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5788Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe TID: 2108Thread sleep time: -11068046444225724s >= -30000s
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe TID: 6632Thread sleep count: 100 > 30
        Source: C:\Windows\System32\svchost.exe TID: 5504Thread sleep time: -240000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeLast function: Thread delayed
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeLast function: Thread delayed
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread delayed: delay time: 922337203685477
        Source: powershell.exe, 00000005.00000003.947213916.0000000004AB7000.00000004.00000001.sdmp, powershell.exe, 00000007.00000003.945068005.0000000005696000.00000004.00000001.sdmpBinary or memory string: k:C:\Windows\system32\WindowsPowerShell\v1.0\Modules\Hyper-V
        Source: powershell.exe, 00000005.00000003.947213916.0000000004AB7000.00000004.00000001.sdmp, powershell.exe, 00000007.00000003.945068005.0000000005696000.00000004.00000001.sdmpBinary or memory string: Hyper-V
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: !noValueButYesKeySC:\WINDOWS\system32\drivers\VBoxMouse.sys
        Source: WerFault.exe, 00000016.00000002.875372877.0000000004620000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWpTr
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMWAREESOFTWARE\VMware, Inc.\VMware Tools
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: WerFault.exe, 00000016.00000002.878996032.0000000004720000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.854618894.000001BB1BA4F000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: kernel32.dll/wine_get_unix_file_nameQEMU
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMwareVBox
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: WerFault.exe, 00000016.00000003.773316002.0000000005630000.00000004.00000001.sdmpBinary or memory string: InstallPathKC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\OC:\WINDOWS\system32\drivers\vmmouse.sysMC:\WINDOWS\system32\drivers\vmhgfs.sys
        Source: svchost.exe, 00000004.00000002.689700481.000001B37F940000.00000002.00000001.sdmp, svchost.exe, 00000011.00000002.748337376.000001D53AC60000.00000002.00000001.sdmp, WerFault.exe, 00000016.00000002.879524137.0000000004920000.00000002.00000001.sdmp, svchost.exe, 00000018.00000002.791088837.000001ABD6740000.00000002.00000001.sdmp, svchost.exe, 0000001A.00000002.875331414.000001BB1CA00000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess information queried: ProcessInformationJump to behavior

        Anti Debugging:

        barindex
        Hides threads from debuggersShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeThread information set: HideFromDebuggerJump to behavior
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeThread information set: HideFromDebugger
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess queried: DebugPortJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess token adjusted: Debug
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Adds a directory exclusion to Windows DefenderShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeMemory written: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeMemory written: unknown base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -ForceJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c timeout 1Jump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeProcess created: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeJump to behavior
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 1
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
        Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Windows\System32\svchost.exeProcess created: unknown unknown
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exeQueries volume information: unknown VolumeInformation
        Source: C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: y3t4g48gj6_PAYMENT.exe, 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: y3t4g48gj6_PAYMENT.exe PID: 6928, type: MEMORY
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.y3t4g48gj6_PAYMENT.exe.47401f0.2.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder11Process Injection111Masquerading221OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder11Disable or Modify Tools11LSASS MemorySecurity Software Discovery321Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion241Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection111NTDSVirtualization/Sandbox Evasion241Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsTimestomp1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery12Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 411524 Sample: y3t4g48gj6_PAYMENT.exe Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 47 omaprilcode.duckdns.org 2->47 51 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->51 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 10 other signatures 2->57 8 y3t4g48gj6_PAYMENT.exe 3 6 2->8         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        16 5 other processes 2->16 signatures3 process4 file5 43 C:\Windows\Resources\Themes\...\svchost.exe, PE32 8->43 dropped 45 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 8->45 dropped 61 Creates an autostart registry key pointing to binary in C:\Windows 8->61 63 Adds a directory exclusion to Windows Defender 8->63 65 Tries to delay execution (extensive OutputDebugStringW loop) 8->65 73 2 other signatures 8->73 18 y3t4g48gj6_PAYMENT.exe 8->18         started        23 cmd.exe 8->23         started        25 powershell.exe 25 8->25         started        29 3 other processes 8->29 67 Multi AV Scanner detection for dropped file 12->67 69 Machine Learning detection for dropped file 12->69 71 Hides threads from debuggers 12->71 27 WerFault.exe 14->27         started        signatures6 process7 dnsIp8 49 omaprilcode.duckdns.org 194.5.97.75, 49763, 49768, 8090 DANILENKODE Netherlands 18->49 41 C:\Users\user\AppData\Roaming\...\run.dat, data 18->41 dropped 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->59 31 conhost.exe 23->31         started        33 timeout.exe 23->33         started        35 conhost.exe 25->35         started        37 conhost.exe 29->37         started        39 conhost.exe 29->39         started        file9 signatures10 process11

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        y3t4g48gj6_PAYMENT.exe15%ReversingLabsWin32.Trojan.Generic
        y3t4g48gj6_PAYMENT.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe100%Joe Sandbox ML
        C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe15%ReversingLabsWin32.Trojan.Generic

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        omaprilcode.duckdns.org3%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        omaprilcode.duckdns.org3%VirustotalBrowse
        omaprilcode.duckdns.org0%Avira URL Cloudsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        https://go.micro0%URL Reputationsafe
        http://crl.mi&0%Avira URL Cloudsafe
        https://displaycatalog.mp.microsoft0%Avira URL Cloudsafe
        http://crl.microsoft.co0%URL Reputationsafe
        http://crl.microsoft.co0%URL Reputationsafe
        http://crl.microsoft.co0%URL Reputationsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        omaprilcode.duckdns.org
        194.5.97.75
        truetrueunknown

        Contacted URLs

        NameMaliciousAntivirus DetectionReputation
        omaprilcode.duckdns.orgtrue
        • 3%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dateofbirthrhttp://schemas.xmlsoap.org/ws/2005WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
          high
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifierWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressxhttp://schemas.xmlsoap.org/ws/200WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
              high
              https://corp.roblox.com/contact/svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                high
                https://go.micropowershell.exe, 00000007.00000003.882256216.0000000005A08000.00000004.00000001.sdmp, powershell.exe, 00000009.00000003.866423473.0000000005B0D000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.mi&powershell.exe, 00000009.00000003.955076797.0000000008E7F000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                https://www.roblox.com/developsvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                  high
                  https://instagram.com/hiddencity_svchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/otherphoneWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/mobilephoneWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/stateorprovinceWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                          high
                          https://corp.roblox.com/parents/svchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/streetaddresszhttp://schemas.xmlsoap.org/ws/20WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/postalcoderhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authenticationWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                  high
                                  https://displaycatalog.mp.microsoftsvchost.exe, 0000001A.00000002.860682383.000001BB1BA6F000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.g5e.com/G5_End_User_License_Supplemental_Termssvchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishednamejhttp://schemas.xmlsoap.oWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysidWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                        high
                                        http://crl.microsoft.copowershell.exe, 00000007.00000003.977026096.0000000008F5D000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecisionzhttp://schemas.xmlsoap.oWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                          high
                                          https://www.roblox.com/info/privacysvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.g5e.com/termsofservicesvchost.exe, 0000001A.00000003.815968690.000001BB1C376000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.817293823.000001BB1C355000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.815054166.000001BB1C3B8000.00000004.00000001.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/thumbprintrhttp://schemas.xmlsoap.org/ws/2005/WerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                                high
                                                https://en.help.roblox.com/hc/en-ussvchost.exe, 0000001A.00000003.840975195.000001BB1C364000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.842135809.000001BB1C356000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWerFault.exe, 00000016.00000003.782921316.0000000004E40000.00000004.00000001.sdmpfalse
                                                    high

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    194.5.97.75
                                                    omaprilcode.duckdns.orgNetherlands
                                                    208476DANILENKODEtrue

                                                    General Information

                                                    Joe Sandbox Version:32.0.0 Black Diamond
                                                    Analysis ID:411524
                                                    Start date:12.05.2021
                                                    Start time:00:13:03
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 12m 34s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Sample file name:y3t4g48gj6_PAYMENT.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:33
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@31/21@5/1
                                                    EGA Information:
                                                    • Successful, ratio: 25%
                                                    HDC Information:
                                                    • Successful, ratio: 0% (good quality ratio 0%)
                                                    • Quality average: 0%
                                                    • Quality standard deviation: 0%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 84
                                                    • Number of non-executed functions: 4
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Excluded IPs from analysis (whitelisted): 20.50.102.62, 40.88.32.150, 52.113.196.254, 13.107.3.254, 104.43.139.144, 92.122.145.220, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 20.82.209.183
                                                    • Excluded domains from analysis (whitelisted): s-ring.msedge.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, teams-9999.teams-msedge.net, e12564.dspb.akamaiedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus16.cloudapp.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, s-ring.s-9999.s-msedge.net, ris.api.iris.microsoft.com, s-9999.s-msedge.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, teams-ring.teams-9999.teams-msedge.net, teams-ring.msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • Report size getting too big, too many NtSetInformationFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    00:14:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5 C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                    00:14:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce 51h0d2Kf8543fo5 C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                    00:14:34API Interceptor797x Sleep call for process: y3t4g48gj6_PAYMENT.exe modified
                                                    00:15:06API Interceptor154x Sleep call for process: powershell.exe modified
                                                    00:15:07API Interceptor10x Sleep call for process: svchost.exe modified
                                                    00:15:27API Interceptor1x Sleep call for process: WerFault.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    194.5.97.75y3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                                                      IPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                        q19CDiK5TD.exeGet hashmaliciousBrowse
                                                          d9hGzIR8mh.exeGet hashmaliciousBrowse
                                                            6554353_Payment_Invoice.exeGet hashmaliciousBrowse

                                                              Domains

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              omaprilcode.duckdns.orgIPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              q19CDiK5TD.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75

                                                              ASN

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              DANILENKODEy3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.98.38
                                                              5lQuLT5Zu8.exeGet hashmaliciousBrowse
                                                              • 194.5.97.116
                                                              IPUt7Nr2CH.exeGet hashmaliciousBrowse
                                                              • 194.5.97.75
                                                              Passport_ID_jpg.jarGet hashmaliciousBrowse
                                                              • 194.5.98.228
                                                              Vd80r7R7K5.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              noVPhNP46G.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              LQ0dDP64uk.exeGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              SCAN_DOCX-36673672.exeGet hashmaliciousBrowse
                                                              • 194.5.97.11
                                                              4b092c1e_by_Libranalysis.docxGet hashmaliciousBrowse
                                                              • 194.5.98.208
                                                              QW8lWJDpU8.exeGet hashmaliciousBrowse
                                                              • 194.5.98.5
                                                              2a8f04dd_by_Libranalysis.docmGet hashmaliciousBrowse
                                                              • 194.5.98.210
                                                              Invoice_orderYscFwfO1peuGl0w.exeGet hashmaliciousBrowse
                                                              • 194.5.98.250
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              Quotation.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87
                                                              EFT payment.exeGet hashmaliciousBrowse
                                                              • 194.5.97.215
                                                              Contract_Documents_pdf.exeGet hashmaliciousBrowse
                                                              • 194.5.98.203
                                                              BANK DETAILS.jarGet hashmaliciousBrowse
                                                              • 194.5.97.87

                                                              JA3 Fingerprints

                                                              No context

                                                              Dropped Files

                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exey3t4g48gj6_PAYMENT.exeGet hashmaliciousBrowse

                                                                Created / dropped Files

                                                                C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_y3t4g48gj6_PAYME_ce53192e427e57e166223ab89fc2d2b1ddc61e_5e276ace_19efd6a0\Report.wer
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):15280
                                                                Entropy (8bit):3.775347590417521
                                                                Encrypted:false
                                                                SSDEEP:192:q/sAUZmHBUZMXyaKKIKZDnyK/u7sXS274It3y:VhQBUZMXyatyK/u7sXX4It3y
                                                                MD5:A94512BA4E48E8A4E173250156DA6D41
                                                                SHA1:63A3156CDA29FA63E43C13D73A22889D7DF25122
                                                                SHA-256:6F21687361C6811F7061DF732E21578B5D63A24976EF850E4128E44842B29D69
                                                                SHA-512:19559F7395B6EB6F26E843F1C1F5C023604E1A8802ACA72B169CB2D388DC9E8D36A6A72057D2CBE902592802C6E2AA97A2A61C020E3F3C112188FD3B2AFC98C8
                                                                Malicious:false
                                                                Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.5.2.4.4.8.8.1.1.0.3.1.3.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.5.2.4.4.9.2.5.0.5.6.1.3.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.0.3.3.3.b.2.8.-.1.b.5.1.-.4.b.3.d.-.b.8.0.6.-.1.d.2.7.f.a.d.b.b.9.1.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.d.f.0.1.6.b.-.e.2.1.b.-.4.2.a.f.-.a.9.1.5.-.8.5.3.8.d.7.0.b.5.c.e.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.y.3.t.4.g.4.8.g.j.6._.P.A.Y.M.E.N.T...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.v.a.l.u.e.i.n.f.i.n.i.t.e.V.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.1.0.-.0.0.0.1.-.0.0.1.b.-.9.4.4.4.-.6.d.e.d.b.2.4.6.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.6.e.f.1.2.5.e.5.0.7.7.7.c.1.9.0.1.6.8.b.0.9.3.3.d.c.1.b.0.4.1.0.0.0.0.0.0.0.0.!.0.0.0.0.e.3.8.1.0.d.2.1.6.0.0.b.b.0.1.1.3.b.
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER1FC3.tmp.dmp
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 14 streams, Tue May 11 22:14:57 2021, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):305499
                                                                Entropy (8bit):3.8298999866185572
                                                                Encrypted:false
                                                                SSDEEP:3072:Tf80xXjd+pTMIkNU9gIOgF5PcB05TUCgU9o4BYtY/i9k0:Tk0epZ9RpDPcBmTTj99NS
                                                                MD5:7D130039893F26127B6B113B84A19BFB
                                                                SHA1:96FF809B293E3A8BEEE51865E62484569F83C3B9
                                                                SHA-256:3FA83E5961F135CFA73F0DB8D14F09BD94BFE9FA6A1974901E754C05336F0F25
                                                                SHA-512:212935D4DBEEEADA6EE29FBC5C88835C095A6A897502D281BCCE00BE35C25B90DF2A16FB7A1949A3A1B5130F47EDD7627DA51E7D7C8833EA5673B2B4832D6C74
                                                                Malicious:false
                                                                Preview: MDMP....... ..........`...................U...........B.......&......GenuineIntelW...........T..............`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER7074.tmp.WERInternalMetadata.xml
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):8440
                                                                Entropy (8bit):3.7044703156329724
                                                                Encrypted:false
                                                                SSDEEP:192:Rrl7r3GLNiTW6f8e6YrgSUD3xizegmfZGSCM+prQ89buXsfxam:RrlsNiC696YsSUD3xJgmf0SgucfN
                                                                MD5:86EBB60ECFCDEE51CC5E2BA6D692B82D
                                                                SHA1:0BE08C903439560539DB77CF7006E2ECC85FA103
                                                                SHA-256:E38FBE59EAB3E0E38BD136F347B82B9EC76A4A7C4F88922B52003CADD66DAC04
                                                                SHA-512:61DB6130DB4A375E1E502CA5E8A983AE78596FAB17CC9B048BD33B4E847F5A92CBC45C11D304A9C78B429798CA1BFDFBF3B9B3F9639C78382502B810DBC296CD
                                                                Malicious:false
                                                                Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.2.8.<./.P.i.d.>.......
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A37.tmp.xml
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4800
                                                                Entropy (8bit):4.516544893622802
                                                                Encrypted:false
                                                                SSDEEP:48:cvIwSD8zstJgtWI9mAWSC8Bl/8fm8M4JGFF/+q8vNgFrWgmibkJWBed:uITfHl5SNLkJGKusgsJWBed
                                                                MD5:7D19CCC31128554AAEB15798DF1DB3D7
                                                                SHA1:69382D763E87D9F30BAC581405DDB753BFB4CF2B
                                                                SHA-256:33B0D886F95B6191748DB94403FBC4F9E0A1545E39CDE58506D642C412F2E4E8
                                                                SHA-512:DE0505CB364DE9793513DE03BE92170EAADAE326CBC890AEA11A6B020519D6A63967A8D5334B0933057D4F83C72D5B9A3662D313BBD7DA35157C00C102394A76
                                                                Malicious:false
                                                                Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="985405" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AC2.tmp.csv
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):59720
                                                                Entropy (8bit):3.048130523171908
                                                                Encrypted:false
                                                                SSDEEP:1536:ShHV75zlWFhnmv+5+xqra1TBTf3ZMygYjtu7BJOejPW3Eoh8m:ShHV75zlWFhnmv+5+xqra1TBTf3ZMygW
                                                                MD5:CE3996BD9D5C68F023A1C9AD0DA4731A
                                                                SHA1:812DB2F7B714585F0220BB8B19420CC7E170A2AD
                                                                SHA-256:9F6A0607A749A170B9B589CCC4FC27213AD4CB6DCE0F6794B5F0B52F94A6CEAA
                                                                SHA-512:682A1D0A8209E48FD1CC2639B0EA4FA62FD97D5BFD49EEABF6AEE4E37EE17A1DB875C96C39849927D6D886D15FB04601AC186B903FFE191CBDC9C47D666A2A7A
                                                                Malicious:false
                                                                Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                C:\ProgramData\Microsoft\Windows\WER\Temp\WER93FA.tmp.txt
                                                                Process:C:\Windows\System32\svchost.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):13340
                                                                Entropy (8bit):2.6972444993893148
                                                                Encrypted:false
                                                                SSDEEP:96:9GiZYW4/AdByYtY0rWt75HBYEZWpt6i9wMsDw6yUqGz2aFzxtKDFIr07f3:9jZDOKO7QQBJ2aFzxtK2r07f3
                                                                MD5:A1C6E15AA334B1AECE85CA59407134CB
                                                                SHA1:905391A1ADAE7CC71A6A0071EFDE7085F1B54715
                                                                SHA-256:8D2295E7C6F0A72BFD2E96B8E7464E37B92F5F292BBC5E24DDD2B5D4D9C5DD11
                                                                SHA-512:E6D85428869691D6C68C1DC63BFE2A6E04E74CFF6482C3705A3D3211025AB8DD9B15C3E10FB91B3763F5176BA3AB3BA29BFB4514BC0832E4ED0A8BF6A8B9A403
                                                                Malicious:false
                                                                Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):14734
                                                                Entropy (8bit):4.996142136926143
                                                                Encrypted:false
                                                                SSDEEP:384:SEdVoGIpN6KQkj2Zkjh4iUxN0igHWrxSXX35fYoJib4J:SYV3IpNBQkj2Yh4iUxN0igHWrxSH3VYO
                                                                MD5:56DB04A4DAB9C936C40C58D7FA8A00E3
                                                                SHA1:1201D3473239F5F79D26EB7F9C5E56E7C0E96A53
                                                                SHA-256:F2E111C84424451D2F71EA3C015B9A01A1B01D24BA0621206C5196DE3EE37496
                                                                SHA-512:DBA211C75EF3B5EBEF4467AD861A146EEC316CF4DD886D730B97FCDB895BB49C2915928600211115064F074A09A11DF3B06083730D4893C83E0D73E06D524C51
                                                                Malicious:false
                                                                Preview: PSMODULECACHE.............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script................T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1oxbwxew.pcj.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e0o1odeg.iei.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvyyesyi.piw.psm1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uckgpted.as3.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhp5apco.gly.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmccu5xf.g3m.ps1
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:very short file (no magic)
                                                                Category:dropped
                                                                Size (bytes):1
                                                                Entropy (8bit):0.0
                                                                Encrypted:false
                                                                SSDEEP:3:U:U
                                                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                Malicious:false
                                                                Preview: 1
                                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):8
                                                                Entropy (8bit):3.0
                                                                Encrypted:false
                                                                SSDEEP:3:DpYn:1Yn
                                                                MD5:A5A28903921B20910E2EE7091732DE1C
                                                                SHA1:0873906F993AA5469C444E7DD37A6A3BD759CE6D
                                                                SHA-256:90134F63A5D6F12BD0BB86A4619DE54E09828CA8EC67B34C552B236815A74D9F
                                                                SHA-512:489CB1556C899A3A2D7551464C0B746CD07D9E77A69BB2B7CEE4F0066F555E2EF46C1934EFDCE094C029B5BDD47C2273C47F3999C1B493ABBF0BF13CF4B47B4E
                                                                Malicious:true
                                                                Preview: )g.(...H
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.74EAy5QA.20210512001414.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1706
                                                                Entropy (8bit):5.321385688312608
                                                                Encrypted:false
                                                                SSDEEP:48:BZ8Vvj1oO+SWsMqDYB1ZHdW2Zfvj1oO+SWsMqDYB1ZuG:BZ8Zj1NQpqDo1Z42Z3j1NQpqDo1ZuG
                                                                MD5:A45AE807B95F637802628FC6E2D6855C
                                                                SHA1:AD0A9D935A4DED5C2E1576EDFB81424BD3E91E4C
                                                                SHA-256:FEDD06D6E15A769CDC0998779A4E8E04A0E9C4085AAFD23D0757EFC999597001
                                                                SHA-512:BB743F38FDD23931F69727AEF16743C9B33E9C38475DEF13C4A8E2AD171564CDA9776E60F28214612D6D8CA0DE38EC54E509BDBD0659E39F3E1096CD63423EE7
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001448..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..Process ID: 6824..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001449..**********************..PS>Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210512001610..Username: computer\user
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.GKdgCFyc.20210512001413.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):860
                                                                Entropy (8bit):5.361096625858647
                                                                Encrypted:false
                                                                SSDEEP:24:BxSAWC7vBZ1x2DOXUWeSuaEvAWbHjeTKKjX4CIym1ZJX+XuaEv8:BZpvj1oO+SKbqDYB1Zsr
                                                                MD5:44D3B6228F41D5E622F8E2A8BF9FAAE0
                                                                SHA1:D88312467F11837CE780438435288535BB082BC6
                                                                SHA-256:214B12327DFED7D0D6C2A5E204DBBBA48708EA75BEB402567A95A82BD4B307CE
                                                                SHA-512:2BA4E2248CB8C87412AE724C080734223933F07F69566436F45F3998ED9155C1D6BB0D09581F057F57619A196CD1CD48E14D03C4A442C518AB158508B45FA9D6
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001447..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe -Force..Process ID: 6328..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001448..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe -Force..
                                                                C:\Users\user\Documents\20210512\PowerShell_transcript.141700.ji+N4HzO.20210512001411.txt
                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1574
                                                                Entropy (8bit):5.3402451113638065
                                                                Encrypted:false
                                                                SSDEEP:48:BZevj1oO+SWsjqDYB1ZjW2ZQHvj1oO+SWsjqDYB1ZA:BZSj1NQKqDo1Zi2ZKj1NQKqDo1ZA
                                                                MD5:323E7CEE88FEB16FE654554C45E4EE10
                                                                SHA1:B726DF3FB4AB7486542B8C0D018C4F80A6F65924
                                                                SHA-256:0AEDBE761059CF8244C89916D84505CDBBDFE20B752EE0334C44FC9486AC50C3
                                                                SHA-512:554AA6C8E5E4DA4E743355BD9D25BC069C70331120AA179B4734C3DC24726B57F71EA4FA733C6CAEF6103793B0FC9E5FAFF9E07804BA9038A9E74616D40C42E0
                                                                Malicious:false
                                                                Preview: .**********************..Windows PowerShell transcript start..Start time: 20210512001435..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 141700 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..Process ID: 1376..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20210512001436..**********************..PS>Add-MpPreference -ExclusionPath C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe -Force..**********************..Windows PowerShell transcript start..Start time: 20210512002108..Username: computer\user
                                                                C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3867176
                                                                Entropy (8bit):2.590642055759663
                                                                Encrypted:false
                                                                SSDEEP:24576:Bg2krlcNk1WgwmNHtf+Gqwqf/JOy0h1qMEIGCjx9h3CIf9rMRrdA7w1cYAnXs6M7:Bh
                                                                MD5:9998F7E0C708BA1FA4B56235A9811C0F
                                                                SHA1:E3810D21600BB0113B2D7116347326BEB6A35D83
                                                                SHA-256:9F44F33F1B0B724292959B65AE6F2918CB1993641AD7832FFDBD68FC00FDDA2C
                                                                SHA-512:69A0FEA89ADC2F259624E6ABA5CF20194A904E8656444DF6894785775F57DAEC33AB08903D5147152482D7CFAAFF91C30FA51965FE472EB1E91DF42B709432F2
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 15%
                                                                Joe Sandbox View:
                                                                • Filename: y3t4g48gj6_PAYMENT.exe, Detection: malicious, Browse
                                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%Y............"...0...:...........;.. ... ;...@.. .......................`;.....5S;...@...................................;.O.... ;...............:.(....@;...................................................... ............... ..H............text...4.:.. ....:................. ..`.rsrc........ ;.......:.............@..@.reloc.......@;.......:.............@..B..................;.....H.......`$..|.:..........#...............................................*&.(......*".......*".(.....*Vs....(....t.........*6.rK..p(.....*".(.....*.s.........*..0..9........~.........,".r...p.....(....o....s............~.....+..*....0...........~.....+..*..0...........~.....+..*..0............(.....+.+........*.0..9.............r.:p+........(....(......(.......(......................%.. .o.........+L..........r..:p(........,.+*..o...........,.+...(.......~......o.........X..
                                                                C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe:Zone.Identifier
                                                                Process:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Preview: [ZoneTransfer]....ZoneId=0

                                                                Static File Info

                                                                General

                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):2.590642055759663
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:y3t4g48gj6_PAYMENT.exe
                                                                File size:3867176
                                                                MD5:9998f7e0c708ba1fa4b56235a9811c0f
                                                                SHA1:e3810d21600bb0113b2d7116347326beb6a35d83
                                                                SHA256:9f44f33f1b0b724292959b65ae6f2918cb1993641ad7832ffdbd68fc00fdda2c
                                                                SHA512:69a0fea89adc2f259624e6aba5cf20194a904e8656444df6894785775f57daec33ab08903d5147152482d7cfaaff91c30fa51965fe472eb1e91df42b709432f2
                                                                SSDEEP:24576:Bg2krlcNk1WgwmNHtf+Gqwqf/JOy0h1qMEIGCjx9h3CIf9rMRrdA7w1cYAnXs6M7:Bh
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...%Y............"...0...:...........;.. ... ;...@.. .......................`;.....5S;...@................................

                                                                File Icon

                                                                Icon Hash:00828e8e8686b000

                                                                Static PE Info

                                                                General

                                                                Entrypoint:0x7b032e
                                                                Entrypoint Section:.text
                                                                Digitally signed:true
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                Time Stamp:0xD9F65925 [Sat Nov 17 01:55:49 2085 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:v4.0.30319
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                Authenticode Signature

                                                                Signature Valid:false
                                                                Signature Issuer:C=by64bc71k4HZ0Yw5C4bba6cc73Yfz0a, S=H9a5205c91ku3, L=5Jp25b35, T=NweE2NdNRd1J7Jb5wDdffe141z527c2ci41dgw3, E=4rhdU4t04, OU=484d0C6323bzd4c97q3, O=bR673KfoLs612894halpX4a4d0qGA2d583, CN=44Ql7muB5F53555J17d1o
                                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                Error Number:-2146762487
                                                                Not Before, Not After
                                                                • 5/11/2021 4:54:44 PM 5/11/2022 4:54:44 PM
                                                                Subject Chain
                                                                • C=by64bc71k4HZ0Yw5C4bba6cc73Yfz0a, S=H9a5205c91ku3, L=5Jp25b35, T=NweE2NdNRd1J7Jb5wDdffe141z527c2ci41dgw3, E=4rhdU4t04, OU=484d0C6323bzd4c97q3, O=bR673KfoLs612894halpX4a4d0qGA2d583, CN=44Ql7muB5F53555J17d1o
                                                                Version:3
                                                                Thumbprint MD5:987431C54CFEF315C111B5AB521BCAC1
                                                                Thumbprint SHA-1:DD65EBFE2F0AF6EC396DC73C4A037E87E321A06B
                                                                Thumbprint SHA-256:93C6C15FCE022D65F38E693A5BADB285F2BE5AC5EC2BFC2707FBF16E192C6E96
                                                                Serial:00BEABD3255E63776CE32FBB6B780B4783

                                                                Entrypoint Preview

                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al

                                                                Data Directories

                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3b02dc0x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b20000x5d8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x3aee000x1428.text
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b40000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                Sections

                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x3ae3340x3ae400unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x3b20000x5d80x600False0.421223958333data4.14589146106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x3b40000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                Resources

                                                                NameRVASizeTypeLanguageCountry
                                                                RT_VERSION0x3b20a00x34cdata
                                                                RT_MANIFEST0x3b23ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                Imports

                                                                DLLImport
                                                                mscoree.dll_CorExeMain

                                                                Version Infos

                                                                DescriptionData
                                                                Translation0x0000 0x04b0
                                                                LegalCopyrightCopyright 2021
                                                                Assembly Version1.0.0.0
                                                                InternalNamevalueinfiniteVM.exe
                                                                FileVersion1.0.0.0
                                                                CompanyName
                                                                LegalTrademarks
                                                                Comments
                                                                ProductNamevalueinfiniteVM
                                                                ProductVersion1.0.0.0
                                                                FileDescriptionvalueinfiniteVM
                                                                OriginalFilenamevalueinfiniteVM.exe

                                                                Network Behavior

                                                                Snort IDS Alerts

                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                05/12/21-00:13:48.392906ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                                                05/12/21-00:15:31.723102TCP2025019ET TROJAN Possible NanoCore C2 60B497638090192.168.2.4194.5.97.75
                                                                05/12/21-00:16:04.101380TCP2025019ET TROJAN Possible NanoCore C2 60B497688090192.168.2.4194.5.97.75

                                                                Network Port Distribution

                                                                TCP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 12, 2021 00:14:43.788465023 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:14:46.792166948 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:14:52.808243990 CEST497478090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:10.322053909 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:13.325598955 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:19.341764927 CEST497548090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:28.145988941 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.155237913 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.301479101 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:31.301733017 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:31.723102093 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:33.773086071 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:34.309803963 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:34.309879065 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:40.307595968 CEST809049763194.5.97.75192.168.2.4
                                                                May 12, 2021 00:15:40.307760000 CEST497638090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:41.792853117 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:44.789021969 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:15:50.797631979 CEST497648090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:03.954149008 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.100481987 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.100650072 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.101380110 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.533061028 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:04.730457067 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.783890963 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:04.812871933 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:05.236252069 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:05.767527103 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:06.542301893 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:06.542392015 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:06.673913956 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:08.632468939 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:09.934705019 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:09.934843063 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:10.564354897 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:12.471256971 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:12.615432978 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:12.674413919 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:13.238096952 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:16.402070045 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:16.402164936 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:23.840174913 CEST809049768194.5.97.75192.168.2.4
                                                                May 12, 2021 00:16:23.840329885 CEST497688090192.168.2.4194.5.97.75
                                                                May 12, 2021 00:16:24.225354910 CEST497688090192.168.2.4194.5.97.75

                                                                UDP Packets

                                                                TimestampSource PortDest PortSource IPDest IP
                                                                May 12, 2021 00:13:47.283850908 CEST5453153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:47.349101067 CEST53545318.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.318806887 CEST5453153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.392785072 CEST53545318.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.682116985 CEST4971453192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.713285923 CEST5802853192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:48.732155085 CEST53497148.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:48.771641016 CEST53580288.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:49.002873898 CEST5309753192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:49.053747892 CEST53530978.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:50.382838964 CEST4925753192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:50.434345007 CEST53492578.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:51.293567896 CEST6238953192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:51.345249891 CEST53623898.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:52.441109896 CEST4991053192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:52.482429981 CEST5585453192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:52.492783070 CEST53499108.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:52.546390057 CEST53558548.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:53.612421989 CEST6454953192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:53.663944960 CEST53645498.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:54.774204016 CEST6315353192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:54.825186968 CEST53631538.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:55.702600956 CEST5299153192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:55.761754990 CEST53529918.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:58.134063005 CEST5370053192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:58.193779945 CEST53537008.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:58.962601900 CEST5172653192.168.2.48.8.8.8
                                                                May 12, 2021 00:13:59.015543938 CEST53517268.8.8.8192.168.2.4
                                                                May 12, 2021 00:13:59.989438057 CEST5679453192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:00.039705992 CEST53567948.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:00.903989077 CEST5653453192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:00.963895082 CEST53565348.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:01.891772985 CEST5662753192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:01.942437887 CEST53566278.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:02.808167934 CEST5662153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:02.858401060 CEST53566218.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:03.662923098 CEST6311653192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:03.714517117 CEST53631168.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:05.820904970 CEST6407853192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:05.870121956 CEST53640788.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:06.680989981 CEST6480153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:06.741204023 CEST53648018.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:07.580405951 CEST6172153192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:07.630373955 CEST53617218.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:09.403549910 CEST5125553192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:09.452264071 CEST53512558.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:12.811872959 CEST6152253192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:12.873574018 CEST53615228.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:13.833559036 CEST5233753192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:13.885293007 CEST53523378.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:23.476809978 CEST5504653192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:23.534064054 CEST53550468.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:43.556190014 CEST4961253192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:43.774633884 CEST53496128.8.8.8192.168.2.4
                                                                May 12, 2021 00:14:44.364456892 CEST4928553192.168.2.48.8.8.8
                                                                May 12, 2021 00:14:44.423496962 CEST53492858.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:06.603167057 CEST5060153192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:06.708455086 CEST53506018.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:07.856023073 CEST6087553192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:07.925179005 CEST53608758.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:07.970230103 CEST5644853192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:08.027524948 CEST53564488.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:09.296216011 CEST5917253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:09.353558064 CEST53591728.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:09.734013081 CEST6242053192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:09.795109034 CEST53624208.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:10.081043959 CEST6057953192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:10.142817974 CEST53605798.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:11.973925114 CEST5018353192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:12.081794977 CEST53501838.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:13.219671965 CEST6153153192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:13.276786089 CEST53615318.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:14.196436882 CEST4922853192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:14.256056070 CEST53492288.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:18.381433010 CEST5979453192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:18.438376904 CEST53597948.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:22.224236965 CEST5591653192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:22.273957014 CEST53559168.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:23.093343973 CEST5275253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:23.154314995 CEST53527528.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:27.617356062 CEST6054253192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:27.680609941 CEST53605428.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:28.082577944 CEST6068953192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:28.141998053 CEST53606898.8.8.8192.168.2.4
                                                                May 12, 2021 00:15:41.733375072 CEST6420653192.168.2.48.8.8.8
                                                                May 12, 2021 00:15:41.790450096 CEST53642068.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:00.114984989 CEST5090453192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:00.182513952 CEST53509048.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:03.691982985 CEST5752553192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:03.920447111 CEST53575258.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:10.178857088 CEST5381453192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:10.237946033 CEST53538148.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:25.184329987 CEST5341853192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:25.242866993 CEST53534188.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:29.544163942 CEST6283353192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:29.595927954 CEST53628338.8.8.8192.168.2.4
                                                                May 12, 2021 00:16:34.992768049 CEST5926053192.168.2.48.8.8.8
                                                                May 12, 2021 00:16:35.050043106 CEST53592608.8.8.8192.168.2.4

                                                                ICMP Packets

                                                                TimestampSource IPDest IPChecksumCodeType
                                                                May 12, 2021 00:13:48.392905951 CEST192.168.2.48.8.8.8d05e(Port unreachable)Destination Unreachable

                                                                DNS Queries

                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                May 12, 2021 00:14:43.556190014 CEST192.168.2.48.8.8.80x962aStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:09.734013081 CEST192.168.2.48.8.8.80xb6e0Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:28.082577944 CEST192.168.2.48.8.8.80x9971Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:41.733375072 CEST192.168.2.48.8.8.80xb1aaStandard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)
                                                                May 12, 2021 00:16:03.691982985 CEST192.168.2.48.8.8.80x4279Standard query (0)omaprilcode.duckdns.orgA (IP address)IN (0x0001)

                                                                DNS Answers

                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                May 12, 2021 00:14:43.774633884 CEST8.8.8.8192.168.2.40x962aNo error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:09.795109034 CEST8.8.8.8192.168.2.40xb6e0No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:28.141998053 CEST8.8.8.8192.168.2.40x9971No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:15:41.790450096 CEST8.8.8.8192.168.2.40xb1aaNo error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)
                                                                May 12, 2021 00:16:03.920447111 CEST8.8.8.8192.168.2.40x4279No error (0)omaprilcode.duckdns.org194.5.97.75A (IP address)IN (0x0001)

                                                                Code Manipulations

                                                                Statistics

                                                                CPU Usage

                                                                Click to jump to process

                                                                Memory Usage

                                                                Click to jump to process

                                                                High Level Behavior Distribution

                                                                Click to dive into process behavior distribution

                                                                Behavior

                                                                Click to jump to process

                                                                System Behavior

                                                                General

                                                                Start time:00:13:53
                                                                Start date:12/05/2021
                                                                Path:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe'
                                                                Imagebase:0xa40000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Florian Roth
                                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Joe Security
                                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.951688682.0000000004391000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                Reputation:low

                                                                General

                                                                Start time:00:14:04
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:07
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:07
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:08
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:09
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:09
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe' -Force
                                                                Imagebase:0x3f0000
                                                                File size:430592 bytes
                                                                MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:11
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\System32\cmd.exe' /c timeout 1
                                                                Imagebase:0x11d0000
                                                                File size:232960 bytes
                                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff724c50000
                                                                File size:625664 bytes
                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high

                                                                General

                                                                Start time:00:14:15
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\timeout.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:timeout 1
                                                                Imagebase:0x12a0000
                                                                File size:26112 bytes
                                                                MD5 hash:121A4EDAE60A7AF6F5DFA82F7BB95659
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:21
                                                                Start date:12/05/2021
                                                                Path:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\y3t4g48gj6_PAYMENT.exe
                                                                Imagebase:0xcb0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:23
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
                                                                Imagebase:0x4f0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Antivirus matches:
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 15%, ReversingLabs

                                                                General

                                                                Start time:00:14:23
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:30
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:31
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 6928 -ip 6928
                                                                Imagebase:0xa0000
                                                                File size:434592 bytes
                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:14:32
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:'C:\Windows\Resources\Themes\agcQ435Jh2M0514\svchost.exe'
                                                                Imagebase:0xac0000
                                                                File size:3867176 bytes
                                                                MD5 hash:9998F7E0C708BA1FA4B56235A9811C0F
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:32
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6928 -s 760
                                                                Imagebase:0xa0000
                                                                File size:434592 bytes
                                                                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET

                                                                General

                                                                Start time:00:14:44
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                General

                                                                Start time:00:15:01
                                                                Start date:12/05/2021
                                                                Path:C:\Windows\System32\svchost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                Imagebase:0x7ff6eb840000
                                                                File size:51288 bytes
                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language

                                                                Disassembly

                                                                Code Analysis

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:12.3%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:10
                                                                  Total number of Limit Nodes:2

                                                                  Graph

                                                                  execution_graph 25796 31aa0b8 GetCurrentProcess 25797 31aa12b 25796->25797 25798 31aa132 GetCurrentThread 25796->25798 25797->25798 25799 31aa168 25798->25799 25800 31aa16f GetCurrentProcess 25798->25800 25799->25800 25801 31aa1a5 25800->25801 25802 31aa1cd GetCurrentThreadId 25801->25802 25803 31aa1fe 25802->25803 25804 31aa6e8 DuplicateHandle 25805 31aa77e 25804->25805

                                                                  Executed Functions

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 31667d8-316680e 1 31673b4-31673f2 0->1 2 3166814-3166825 0->2 14 3167424-3167429 1->14 15 31673f4-316740a 1->15 5 3166827-316683f 2->5 6 316689a-31668ab 2->6 5->6 16 3166841-316684d 5->16 11 3166931-316694f 6->11 12 31668b1-31668cf 6->12 23 3166951-3166955 11->23 24 316696e-3166984 11->24 12->11 26 31668d1-31668d5 12->26 15->14 28 316740c-3167423 15->28 16->1 19 3166853-3166895 call 31646b8 16->19 19->6 23->24 29 3166957-3166963 23->29 38 316698a-316698c 24->38 26->11 30 31668d7-31668db 26->30 29->1 31 3166969 29->31 30->1 34 31668e1-31668e6 30->34 31->24 36 31668fe-3166910 34->36 37 31668e8-31668ee 34->37 36->1 42 3166916-3166927 36->42 40 31668f2-31668fc 37->40 41 31668f0 37->41 43 316698e-3166992 38->43 44 31669ab-31669c9 38->44 40->36 41->36 42->1 45 316692d 42->45 43->44 46 3166994-31669a0 43->46 53 31669cf-31669d3 44->53 54 3166aea-3166b08 44->54 45->11 46->1 49 31669a6 46->49 49->44 53->54 55 31669d9-31669dd 53->55 64 3166b0e-3166b12 54->64 65 3166d48-3166d59 54->65 55->1 56 31669e3-31669e8 55->56 58 3166a00-3166a23 56->58 59 31669ea-31669f0 56->59 73 3166a25-3166a27 58->73 74 3166a31-3166abb 58->74 60 31669f4-31669fe 59->60 61 31669f2 59->61 60->58 61->58 64->65 67 3166b18-3166b1c 64->67 71 3166d5f-3166d77 65->71 72 31673aa-31673b1 65->72 67->1 70 3166b22-3166b27 67->70 75 3166b3f-3166c44 70->75 76 3166b29-3166b2f 70->76 71->72 86 3166d7d-3166dd6 71->86 73->74 96 3166ac1-3166ac8 74->96 97 3166abd-3166abf 74->97 75->1 98 3166c4a-3166c4e 75->98 77 3166b33-3166b3d 76->77 78 3166b31 76->78 77->75 78->75 112 316738e-31673a2 86->112 113 3166ddc-3166e08 86->113 99 3166acb-3166ae7 96->99 97->99 100 3166c54-3166c7d 98->100 101 3166d01-3166d08 98->101 100->1 105 3166c83-3166cc9 100->105 101->1 104 3166d0e-3166d13 101->104 107 3166d15-3166d17 104->107 108 3166d19-3166d1e 104->108 117 3166cd5-3166ce5 105->117 118 3166ccb-3166cd3 105->118 111 3166d24-3166d45 107->111 108->111 112->72 124 3166e5c-3166e6c 113->124 125 3166e0a-3166e10 113->125 120 3166ceb-3166cf7 117->120 118->120 120->101 130 3166ec2-3166ed2 124->130 131 3166e6e-3166e74 124->131 126 3166e12-3166e14 125->126 127 3166e1e-3166e57 125->127 126->127 127->112 136 3166f27-3166f37 130->136 137 3166ed4-3166eda 130->137 132 3166e76-3166e78 131->132 133 3166e82-3166ebd 131->133 132->133 133->112 144 3166f8c-3166f9c 136->144 145 3166f39-3166f3f 136->145 140 3166edc-3166ede 137->140 141 3166ee8-3166f22 137->141 140->141 141->112 152 3166fee-3166ffe 144->152 153 3166f9e-3166fa4 144->153 148 3166f41-3166f43 145->148 149 3166f4d-3166f87 145->149 148->149 149->112 161 3167056-3167066 152->161 162 3167000-3167006 152->162 155 3166fa6-3166fa8 153->155 156 3166fb2-3166fe9 153->156 155->156 156->112 169 31670cf-31670df 161->169 170 3167068-316706e 161->170 164 3167014-3167051 162->164 165 3167008-316700a 162->165 164->112 165->164 176 3167136-3167146 169->176 177 31670e1-31670e7 169->177 172 3167070-3167072 170->172 173 316707c-31670ca 170->173 172->173 173->112 184 3167148-316714e 176->184 185 3167199-31671a9 176->185 180 31670f5-3167131 177->180 181 31670e9-31670eb 177->181 180->112 181->180 188 3167150-3167152 184->188 189 316715c-3167194 184->189 192 31671ff-316720f 185->192 193 31671ab-31671b1 185->193 188->189 189->112 201 3167266-3167276 192->201 202 3167211-3167217 192->202 196 31671b3-31671b5 193->196 197 31671bf-31671fa 193->197 196->197 197->112 209 31672cc-31672dc 201->209 210 3167278-316727e 201->210 204 3167225-3167261 202->204 205 3167219-316721b 202->205 204->112 205->204 217 316732e-316733e 209->217 218 31672de-31672e4 209->218 212 3167280-3167282 210->212 213 316728c-31672c7 210->213 212->213 213->112 217->112 224 3167340-3167346 217->224 220 31672e6-31672e8 218->220 221 31672f2-316732c 218->221 220->221 221->112 227 316734a-3167356 224->227 228 3167348 224->228 229 3167358-3167388 227->229 228->229 229->112
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (k$(k$(k$D!k$D!k$D!k$D!k$\k$\k$\k$t%k$t%k
                                                                  • API String ID: 0-892554119
                                                                  • Opcode ID: 3bf69f3bf573c09b8a1f93533339ba204be181a537ddfa61616df08e5dc20467
                                                                  • Instruction ID: cc8fca10347c09417bd76e938e8f090c27f5caacc9608a30c77ad7418bfd53fb
                                                                  • Opcode Fuzzy Hash: 3bf69f3bf573c09b8a1f93533339ba204be181a537ddfa61616df08e5dc20467
                                                                  • Instruction Fuzzy Hash: F3823874A00214CFCB24DF69C894A69B7F6FF89314F2581A9E44A9B361DB31ED81CF52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1a45ea255bde1e5cbd8014f9bce00923be1137e6d29a712390a265cb4502722f
                                                                  • Instruction ID: c00fe607a45126e204ef294ba3aa8b35eae5ada59ef583153690f831773f7c9f
                                                                  • Opcode Fuzzy Hash: 1a45ea255bde1e5cbd8014f9bce00923be1137e6d29a712390a265cb4502722f
                                                                  • Instruction Fuzzy Hash: A6429C30A00700CFDB29CFA5D94866AB7F6BF89315F2888ADD446CB694CB75E995CF10
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46e67ff1d9c8e453d2ea330ab8adecc34e923daf7a1c8a80bf6d5b534cfb40a9
                                                                  • Instruction ID: 94f94486af8c8e2eb67feff258076846d29cfe06ec95d1303aa201e60938fa83
                                                                  • Opcode Fuzzy Hash: 46e67ff1d9c8e453d2ea330ab8adecc34e923daf7a1c8a80bf6d5b534cfb40a9
                                                                  • Instruction Fuzzy Hash: C9F17C34B002099FDB18DFA4D454AAEBBB2FF88304F14C469E806AB359DB35ED55CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e0fc346937147bdca3c17d3f9c26a610353cede0bcca885e42353af1bfc168bd
                                                                  • Instruction ID: e02e0124ad024b10abdefaa3e951f6f12eded0f5e552cb15ebacc5713bd5b155
                                                                  • Opcode Fuzzy Hash: e0fc346937147bdca3c17d3f9c26a610353cede0bcca885e42353af1bfc168bd
                                                                  • Instruction Fuzzy Hash: C7F16A35A007058FCB25CFA9D484AAAFBF2FF88300F198569E8469B755C735E956CF40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4511b9132cb3216a15f5ec781acc6c4df3b943a5b51ac168ba27dd76c7952d0
                                                                  • Instruction ID: 2152a6631fa30991bccf9993752d393cb2cb0be492991fea0a64fd6a8273a1b7
                                                                  • Opcode Fuzzy Hash: b4511b9132cb3216a15f5ec781acc6c4df3b943a5b51ac168ba27dd76c7952d0
                                                                  • Instruction Fuzzy Hash: 12D19F31B052258FCB25CFA8880066AF7A6BFCC711B19886ADD06DB355DB30CD56C7E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5020d9b792c561e927c346bc3519b104fda11e45ed51e66e863104334091570
                                                                  • Instruction ID: 7173bcd779bbabce80a21e1e885bd490ffc26e0e46e8898ceba9613ed8c6cd67
                                                                  • Opcode Fuzzy Hash: f5020d9b792c561e927c346bc3519b104fda11e45ed51e66e863104334091570
                                                                  • Instruction Fuzzy Hash: A5F1B078601205DFDB15DFB8E848BAD7BB6FB8C30AF5C4124EA029B294CB759946CF50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 416407e9fcee1caa9242100fd29c4736b4ed51534c227b31e8b01302a41119f7
                                                                  • Instruction ID: 60830ee7428199c779c5978f33d6d80cd48fb872ec48a1a4c27c97e702a9ccde
                                                                  • Opcode Fuzzy Hash: 416407e9fcee1caa9242100fd29c4736b4ed51534c227b31e8b01302a41119f7
                                                                  • Instruction Fuzzy Hash: ABD12978A00619CFCB14CFADC994AAEBBB2FF8C345F598169E405AB261D730ED41CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 236 31aa0a9-31aa129 GetCurrentProcess 238 31aa12b-31aa131 236->238 239 31aa132-31aa166 GetCurrentThread 236->239 238->239 240 31aa168-31aa16e 239->240 241 31aa16f-31aa1a3 GetCurrentProcess 239->241 240->241 243 31aa1ac-31aa1c7 call 31aa670 241->243 244 31aa1a5-31aa1ab 241->244 247 31aa1cd-31aa1fc GetCurrentThreadId 243->247 244->243 248 31aa1fe-31aa204 247->248 249 31aa205-31aa267 247->249 248->249
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 031AA118
                                                                  • GetCurrentThread.KERNEL32 ref: 031AA155
                                                                  • GetCurrentProcess.KERNEL32 ref: 031AA192
                                                                  • GetCurrentThreadId.KERNEL32 ref: 031AA1EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: bb1a8cf7d7cd05452ccad96d6545ea47f73018d4271fe42869600ded5547c6a1
                                                                  • Instruction ID: 944ed6cfdbd5db0af4793a5f7bb0a125e9580890e52b8f6677fd65bc91ddf67d
                                                                  • Opcode Fuzzy Hash: bb1a8cf7d7cd05452ccad96d6545ea47f73018d4271fe42869600ded5547c6a1
                                                                  • Instruction Fuzzy Hash: 9C5151B49006499FDB14DFA9C988BEEBBF1AF4D308F24845AE409B7350D774A844CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 256 31aa0b8-31aa129 GetCurrentProcess 257 31aa12b-31aa131 256->257 258 31aa132-31aa166 GetCurrentThread 256->258 257->258 259 31aa168-31aa16e 258->259 260 31aa16f-31aa1a3 GetCurrentProcess 258->260 259->260 262 31aa1ac-31aa1c7 call 31aa670 260->262 263 31aa1a5-31aa1ab 260->263 266 31aa1cd-31aa1fc GetCurrentThreadId 262->266 263->262 267 31aa1fe-31aa204 266->267 268 31aa205-31aa267 266->268 267->268
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 031AA118
                                                                  • GetCurrentThread.KERNEL32 ref: 031AA155
                                                                  • GetCurrentProcess.KERNEL32 ref: 031AA192
                                                                  • GetCurrentThreadId.KERNEL32 ref: 031AA1EB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 078649685bd67602ce82c78662813bdc13bdc76aab9b8e09b0b4f729ae3cb10a
                                                                  • Instruction ID: 2534736e6fbbb4d33434fa3ae4eba01fecb00381737466af1ef418c5884f5c2e
                                                                  • Opcode Fuzzy Hash: 078649685bd67602ce82c78662813bdc13bdc76aab9b8e09b0b4f729ae3cb10a
                                                                  • Instruction Fuzzy Hash: 4F5150B49006499FDB14DFA9C988BEEBBF1AF4C308F24841AE409B3750D774A884CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 275 3164e80-3164f00 280 3164f06-3164f35 275->280 281 316523b-3165265 275->281 288 3164f37-3164f42 280->288 289 3164f4a-3164ff7 280->289 284 3165266 281->284 284->284 288->289 303 3165216-316521e 289->303 304 3164ffd-3165018 289->304 305 3165226-3165235 303->305 304->305 309 316501e-316504e 304->309 305->280 305->281 313 3165054-316506d 309->313 314 316515b-3165174 309->314 321 31650e7-31650f5 313->321 322 316506f-316508d 313->322 317 3165176 314->317 318 316517f-3165180 314->318 317->318 318->303 325 31650f7-31650ff 321->325 326 3165109-3165117 321->326 330 3165094-31650ad 322->330 331 316508f-3165092 322->331 349 3165101 call 3165320 325->349 350 3165101 call 316530f 325->350 333 3165129-3165137 326->333 334 3165119-3165127 326->334 328 3165107 332 316514a-3165155 328->332 343 31650b6-31650cf 330->343 344 31650af-31650b4 330->344 335 31650d6-31650dd 331->335 332->313 332->314 333->332 342 3165139-3165147 333->342 334->332 351 31650df call 3165320 335->351 352 31650df call 31657e0 335->352 353 31650df call 316530f 335->353 337 31650e5 337->332 342->332 343->335 348 31650d1 343->348 344->335 348->335 349->328 350->328 351->337 352->337 353->337
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]k$ ]k$Xck$K)
                                                                  • API String ID: 0-1724859692
                                                                  • Opcode ID: 503dbed7383b60472ab027d97ffc82bf3d2f58bf9e5278a5db4a7f414b379a32
                                                                  • Instruction ID: 78f7bdbd2687f9a24a458bf10a7d49fbe99cd47bf3c05f011a088a4fd47cb01b
                                                                  • Opcode Fuzzy Hash: 503dbed7383b60472ab027d97ffc82bf3d2f58bf9e5278a5db4a7f414b379a32
                                                                  • Instruction Fuzzy Hash: 78A16C30B006058FCB14DFA5C5949AEBBB7BF89304B258529D9069F364DF70EC16CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 354 31667d1-316680e 356 31673b4-31673f2 354->356 357 3166814-3166825 354->357 369 3167424-3167429 356->369 370 31673f4-316740a 356->370 360 3166827-316683f 357->360 361 316689a-31668ab 357->361 360->361 371 3166841-316684d 360->371 366 3166931-316694f 361->366 367 31668b1-31668cf 361->367 378 3166951-3166955 366->378 379 316696e-3166984 366->379 367->366 381 31668d1-31668d5 367->381 370->369 383 316740c-3167423 370->383 371->356 374 3166853-3166895 call 31646b8 371->374 374->361 378->379 384 3166957-3166963 378->384 393 316698a-316698c 379->393 381->366 385 31668d7-31668db 381->385 384->356 386 3166969 384->386 385->356 389 31668e1-31668e6 385->389 386->379 391 31668fe-3166910 389->391 392 31668e8-31668ee 389->392 391->356 397 3166916-3166927 391->397 395 31668f2-31668fc 392->395 396 31668f0 392->396 398 316698e-3166992 393->398 399 31669ab-31669c9 393->399 395->391 396->391 397->356 400 316692d 397->400 398->399 401 3166994-31669a0 398->401 408 31669cf-31669d3 399->408 409 3166aea-3166b08 399->409 400->366 401->356 404 31669a6 401->404 404->399 408->409 410 31669d9-31669dd 408->410 419 3166b0e-3166b12 409->419 420 3166d48-3166d59 409->420 410->356 411 31669e3-31669e8 410->411 413 3166a00-3166a23 411->413 414 31669ea-31669f0 411->414 428 3166a25-3166a27 413->428 429 3166a31-3166abb 413->429 415 31669f4-31669fe 414->415 416 31669f2 414->416 415->413 416->413 419->420 422 3166b18-3166b1c 419->422 426 3166d5f-3166d77 420->426 427 31673aa-31673b1 420->427 422->356 425 3166b22-3166b27 422->425 430 3166b3f-3166c44 425->430 431 3166b29-3166b2f 425->431 426->427 441 3166d7d-3166dd6 426->441 428->429 451 3166ac1-3166ac8 429->451 452 3166abd-3166abf 429->452 430->356 453 3166c4a-3166c4e 430->453 432 3166b33-3166b3d 431->432 433 3166b31 431->433 432->430 433->430 467 316738e-31673a2 441->467 468 3166ddc-3166e08 441->468 454 3166acb-3166ae7 451->454 452->454 455 3166c54-3166c7d 453->455 456 3166d01-3166d08 453->456 455->356 460 3166c83-3166cc9 455->460 456->356 459 3166d0e-3166d13 456->459 462 3166d15-3166d17 459->462 463 3166d19-3166d1e 459->463 472 3166cd5-3166ce5 460->472 473 3166ccb-3166cd3 460->473 466 3166d24-3166d45 462->466 463->466 467->427 479 3166e5c-3166e6c 468->479 480 3166e0a-3166e10 468->480 475 3166ceb-3166cf7 472->475 473->475 475->456 485 3166ec2-3166ed2 479->485 486 3166e6e-3166e74 479->486 481 3166e12-3166e14 480->481 482 3166e1e-3166e57 480->482 481->482 482->467 491 3166f27-3166f37 485->491 492 3166ed4-3166eda 485->492 487 3166e76-3166e78 486->487 488 3166e82-3166ebd 486->488 487->488 488->467 499 3166f8c-3166f9c 491->499 500 3166f39-3166f3f 491->500 495 3166edc-3166ede 492->495 496 3166ee8-3166f22 492->496 495->496 496->467 507 3166fee-3166ffe 499->507 508 3166f9e-3166fa4 499->508 503 3166f41-3166f43 500->503 504 3166f4d-3166f87 500->504 503->504 504->467 516 3167056-3167066 507->516 517 3167000-3167006 507->517 510 3166fa6-3166fa8 508->510 511 3166fb2-3166fe9 508->511 510->511 511->467 524 31670cf-31670df 516->524 525 3167068-316706e 516->525 519 3167014-3167051 517->519 520 3167008-316700a 517->520 519->467 520->519 531 3167136-3167146 524->531 532 31670e1-31670e7 524->532 527 3167070-3167072 525->527 528 316707c-31670ca 525->528 527->528 528->467 539 3167148-316714e 531->539 540 3167199-31671a9 531->540 535 31670f5-3167131 532->535 536 31670e9-31670eb 532->536 535->467 536->535 543 3167150-3167152 539->543 544 316715c-3167194 539->544 547 31671ff-316720f 540->547 548 31671ab-31671b1 540->548 543->544 544->467 556 3167266-3167276 547->556 557 3167211-3167217 547->557 551 31671b3-31671b5 548->551 552 31671bf-31671fa 548->552 551->552 552->467 564 31672cc-31672dc 556->564 565 3167278-316727e 556->565 559 3167225-3167261 557->559 560 3167219-316721b 557->560 559->467 560->559 572 316732e-316733e 564->572 573 31672de-31672e4 564->573 567 3167280-3167282 565->567 568 316728c-31672c7 565->568 567->568 568->467 572->467 579 3167340-3167346 572->579 575 31672e6-31672e8 573->575 576 31672f2-316732c 573->576 575->576 576->467 582 316734a-3167356 579->582 583 3167348 579->583 584 3167358-3167388 582->584 583->584 584->467
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: (k$(k$t%k$t%k
                                                                  • API String ID: 0-1847560264
                                                                  • Opcode ID: 2294627345c87eae0e31903cc9e510fb61b658e681fd4aa2b51f7e9573002cd0
                                                                  • Instruction ID: 12e2ec7a605df003c5ebfaab05f0de86309e0bfd30fe043f9802451eae0db233
                                                                  • Opcode Fuzzy Hash: 2294627345c87eae0e31903cc9e510fb61b658e681fd4aa2b51f7e9573002cd0
                                                                  • Instruction Fuzzy Hash: B7A11B34A006048FDB24CF69C494A69B7F6EF88714F29C4A9D80A9F3B5DB31EC94CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 591 3164e70-3164e74 592 3164ec6-3164f00 591->592 593 3164e76-3164e7b 591->593 595 3164f06-3164f35 592->595 596 316523b-3165265 592->596 593->592 603 3164f37-3164f42 595->603 604 3164f4a-3164ff7 595->604 599 3165266 596->599 599->599 603->604 618 3165216-316521e 604->618 619 3164ffd-3165018 604->619 620 3165226-3165235 618->620 619->620 624 316501e-316504e 619->624 620->595 620->596 628 3165054-316506d 624->628 629 316515b-3165174 624->629 636 31650e7-31650f5 628->636 637 316506f-316508d 628->637 632 3165176 629->632 633 316517f-3165180 629->633 632->633 633->618 640 31650f7-31650ff 636->640 641 3165109-3165117 636->641 645 3165094-31650ad 637->645 646 316508f-3165092 637->646 664 3165101 call 3165320 640->664 665 3165101 call 316530f 640->665 648 3165129-3165137 641->648 649 3165119-3165127 641->649 643 3165107 647 316514a-3165155 643->647 658 31650b6-31650cf 645->658 659 31650af-31650b4 645->659 650 31650d6-31650dd 646->650 647->628 647->629 648->647 657 3165139-3165147 648->657 649->647 666 31650df call 3165320 650->666 667 31650df call 31657e0 650->667 668 31650df call 316530f 650->668 652 31650e5 652->647 657->647 658->650 663 31650d1 658->663 659->650 663->650 664->643 665->643 666->652 667->652 668->652
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ]k$ ]k$K)
                                                                  • API String ID: 0-2828888374
                                                                  • Opcode ID: 2af77ed59842daa652b9029c03748b8f790ac69a2ea350019a47c00d7edaadcd
                                                                  • Instruction ID: 5d87b5c25eb59079ca675d6a0a11f2fc3912baa344a7877b432e73f7f58ef0e4
                                                                  • Opcode Fuzzy Hash: 2af77ed59842daa652b9029c03748b8f790ac69a2ea350019a47c00d7edaadcd
                                                                  • Instruction Fuzzy Hash: C6616B34A00A058FCB18DFA4D5949AEB7F2BF89304B24856DD91A9F764DF30ED16CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 669 31aa6e0-31aa6e6 670 31aa6e8-31aa77c DuplicateHandle 669->670 671 31aa77e-31aa784 670->671 672 31aa785-31aa7a2 670->672 671->672
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031AA76F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 286f01db043cde81758a8f619c56a3a6ef1c807ffb6027c133f158027e007aa1
                                                                  • Instruction ID: 63b5fddb23d9c7d64571122d10f8b0486f5a6a0f8493bbd19f51600f652c367a
                                                                  • Opcode Fuzzy Hash: 286f01db043cde81758a8f619c56a3a6ef1c807ffb6027c133f158027e007aa1
                                                                  • Instruction Fuzzy Hash: D021D2B5901208AFDB10CFA9D884ADEBBF4EF48324F14841AE914A7710D379A954CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 675 31aa6e8-31aa77c DuplicateHandle 676 31aa77e-31aa784 675->676 677 31aa785-31aa7a2 675->677 676->677
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031AA76F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907730794.00000000031A0000.00000040.00000001.sdmp, Offset: 031A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_31a0000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 8c53d4655be00ba44b24ef4a0195cc34f6b8e3e03173af374543088ab341facc
                                                                  • Instruction ID: c5d4c207ebfab018a3bb99acf782c38b51a98e23ceb6cde4ba5f8c981437ec1b
                                                                  • Opcode Fuzzy Hash: 8c53d4655be00ba44b24ef4a0195cc34f6b8e3e03173af374543088ab341facc
                                                                  • Instruction Fuzzy Hash: 5921C4B59002089FDB10CF99D984ADEBFF4EB48324F14841AE914B7750D379A954CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 788 316db48-316db62 790 316db64-316db77 788->790 791 316dba2-316dba9 788->791 790->791 793 316db79-316db85 call 3168900 790->793 793->791 796 316db87-316dba0 793->796 796->791 798 316dbaa-316dbc7 796->798 799 316dddf-316de0d call 316b2d0 798->799 800 316dbcd-316dbd4 798->800 813 316de0f-316de14 799->813 814 316de19-316de26 799->814 801 316dbd6-316dbe5 800->801 802 316dc2b-316dc32 800->802 801->799 805 316dbeb-316dc0e 801->805 802->799 804 316dc38-316dc61 802->804 804->799 807 316dc67-316dc6e 804->807 824 316dc14 805->824 825 316dc10-316dc12 805->825 809 316dc70-316dc82 807->809 810 316dcc8-316dcd2 807->810 809->799 815 316dc88-316dcab 809->815 810->799 812 316dcd8-316dce2 810->812 816 316dce4-316dd1e 812->816 817 316dd20-316dd22 812->817 818 316de9e-316dea1 813->818 827 316de2a-316de2c 814->827 828 316de28 814->828 834 316dcb1 815->834 835 316dcad-316dcaf 815->835 816->817 841 316dd67-316dd92 816->841 822 316dd24-316dd5d 817->822 823 316dd5f-316dd66 817->823 822->823 822->841 829 316dc1e-316dc21 824->829 825->829 833 316de34-316de37 827->833 828->818 829->802 836 316de3b-316de48 833->836 837 316de39 833->837 838 316dcbb-316dcbe 834->838 835->838 844 316de4c-316de59 836->844 845 316de4a 836->845 837->818 838->810 841->799 851 316dd94-316ddad 841->851 848 316de5d-316de6a 844->848 849 316de5b 844->849 845->818 853 316de6e-316de7f 848->853 854 316de6c 848->854 849->818 856 316ddb7-316ddbb 851->856 857 316ddaf-316ddb6 851->857 861 316de81-316de86 853->861 862 316de88-316de95 853->862 854->818 859 316ddd4-316ddde 856->859 860 316ddbd-316ddcc 856->860 860->859 861->818 864 316de97 862->864 865 316de99 862->865 864->818 865->818
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: W
                                                                  • API String ID: 0-655174618
                                                                  • Opcode ID: d3371d3ec8b0fb32f533d049998847cf52c71367e90b68cf7458e52b66144009
                                                                  • Instruction ID: 211a1e2bf1421998ae65b0d999fdc8602dd132a096e5f69c7455039a200e6d79
                                                                  • Opcode Fuzzy Hash: d3371d3ec8b0fb32f533d049998847cf52c71367e90b68cf7458e52b66144009
                                                                  • Instruction Fuzzy Hash: 29B1D331B053409FC326DF65E094A69B7E2FF89314B19C59AE14ACB762CB30EC95CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1065 18601c3-18601c6 1066 18601cc-18601d4 1065->1066 1067 18601c8-18601ca 1065->1067 1068 18601d6-18601dc 1066->1068 1069 18601ec-18601f8 1066->1069 1067->1066 1070 18601e0-18601ea 1068->1070 1071 18601de 1068->1071 1074 18601fe-1860201 1069->1074 1075 18602bb-18602c5 1069->1075 1070->1069 1071->1069 1074->1075 1078 1860207-186020b 1074->1078 1076 18602c7-18602cd 1075->1076 1077 18602d0-18602d6 1075->1077 1079 18602dc-18602e8 1077->1079 1080 18602d8-18602da 1077->1080 1081 186020d-186021e 1078->1081 1082 186024b 1078->1082 1084 18602ea-1860307 1079->1084 1080->1084 1088 1860224-1860229 1081->1088 1089 186031a-1860351 1081->1089 1083 186024d-186024f 1082->1083 1083->1075 1085 1860251-1860255 1083->1085 1096 186030c-1860310 1084->1096 1085->1075 1090 1860257-186025b 1085->1090 1092 1860241-1860249 1088->1092 1093 186022b-1860231 1088->1093 1101 1860357-186035c 1089->1101 1102 18604a2-18604d9 1089->1102 1094 186026e 1090->1094 1095 186025d-186026c 1090->1095 1092->1083 1097 1860235-186023f 1093->1097 1098 1860233 1093->1098 1100 1860270-1860272 1094->1100 1095->1100 1097->1092 1098->1092 1100->1075 1103 1860274-1860278 1100->1103 1105 1860374-1860380 1101->1105 1106 186035e-1860364 1101->1106 1115 18604df-18604e4 1102->1115 1116 186062a-1860636 1102->1116 1103->1075 1107 186027a-1860283 1103->1107 1118 1860386-1860389 1105->1118 1119 1860443-186044d 1105->1119 1110 1860366 1106->1110 1111 1860368-1860372 1106->1111 1108 1860285-1860288 1107->1108 1109 1860292-1860299 1107->1109 1108->1109 1113 1860313-1860318 1109->1113 1114 186029b-18602b5 1109->1114 1110->1105 1111->1105 1113->1114 1114->1075 1121 18604e6-18604ec 1115->1121 1122 18604fc-1860508 1115->1122 1118->1119 1124 186038f-1860393 1118->1124 1126 186044f-1860455 1119->1126 1127 1860458-186045e 1119->1127 1128 18604f0-18604fa 1121->1128 1129 18604ee 1121->1129 1136 186050e-1860511 1122->1136 1137 18605cb-18605d5 1122->1137 1130 1860395-18603a6 1124->1130 1131 18603d3 1124->1131 1133 1860464-1860470 1127->1133 1134 1860460-1860462 1127->1134 1128->1122 1129->1122 1130->1102 1149 18603ac-18603b1 1130->1149 1138 18603d5-18603d7 1131->1138 1139 1860472-186048f 1133->1139 1134->1139 1136->1137 1144 1860517-186051b 1136->1144 1140 18605d7-18605dd 1137->1140 1141 18605e0-18605e6 1137->1141 1138->1119 1145 18603d9-18603dd 1138->1145 1162 1860494-1860498 1139->1162 1146 18605ec-18605f8 1141->1146 1147 18605e8-18605ea 1141->1147 1150 186051d-186052e 1144->1150 1151 186055b 1144->1151 1145->1119 1152 18603df-18603e3 1145->1152 1156 18605fa-1860620 1146->1156 1147->1156 1157 18603b3-18603b9 1149->1157 1158 18603c9-18603d1 1149->1158 1150->1116 1169 1860534-1860539 1150->1169 1155 186055d-186055f 1151->1155 1153 18603f6 1152->1153 1154 18603e5-18603f4 1152->1154 1159 18603f8-18603fa 1153->1159 1154->1159 1155->1137 1160 1860561-1860565 1155->1160 1163 18603bd-18603c7 1157->1163 1164 18603bb 1157->1164 1158->1138 1159->1119 1166 18603fc-1860400 1159->1166 1160->1137 1167 1860567-186056b 1160->1167 1163->1158 1164->1158 1166->1119 1170 1860402-186040b 1166->1170 1171 186057e 1167->1171 1172 186056d-186057c 1167->1172 1174 1860551-1860559 1169->1174 1175 186053b-1860541 1169->1175 1176 186040d-1860410 1170->1176 1177 186041a-1860421 1170->1177 1178 1860580-1860582 1171->1178 1172->1178 1174->1155 1180 1860545-186054f 1175->1180 1181 1860543 1175->1181 1176->1177 1182 1860423-186043d 1177->1182 1183 186049b-18604a0 1177->1183 1178->1137 1184 1860584-1860588 1178->1184 1180->1174 1181->1174 1182->1119 1183->1182 1184->1137 1185 186058a-1860593 1184->1185 1188 1860595-1860598 1185->1188 1189 18605a2-18605a9 1185->1189 1188->1189 1190 1860623-1860628 1189->1190 1191 18605ab-18605c5 1189->1191 1190->1191 1191->1137
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.905627009.0000000001860000.00000040.00000001.sdmp, Offset: 01860000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1860000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f53438b90a5533e912e94910658f380e276707b3ac0d2368d68cda28453d14dc
                                                                  • Instruction ID: afb96e6f724d58508cf54ef047aef12f65bc883e1970393eea61bc6613d1de43
                                                                  • Opcode Fuzzy Hash: f53438b90a5533e912e94910658f380e276707b3ac0d2368d68cda28453d14dc
                                                                  • Instruction Fuzzy Hash: 7CE10535304205CFDB268F68C454BAA7BA6EF85319F14C06AF948CB2A2DB75CE45CB52
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1193 3166158-3166162 1194 3166164-3166169 1193->1194 1195 316616a-316616e 1193->1195 1196 31661b4-3166201 1195->1196 1197 3166170-3166186 1195->1197 1210 3166222-316623c 1196->1210 1211 3166203-316620a 1196->1211 1200 31661ae-31661b3 1197->1200 1201 3166188-316618e 1197->1201 1203 3166190-3166196 1201->1203 1204 316619c-316619e 1201->1204 1205 316619a 1203->1205 1206 3166198 1203->1206 1207 31661a0-31661a8 1204->1207 1208 31661a9-31661ac 1204->1208 1205->1204 1206->1204 1208->1200 1208->1201 1216 3166260-3166274 1210->1216 1217 316623e-316624e 1210->1217 1224 316620d call 31662a0 1211->1224 1225 316620d call 3166291 1211->1225 1212 3166213-3166220 1212->1210 1212->1211 1221 3166276-316627b 1216->1221 1222 316627d-316627f 1216->1222 1217->1216 1220 3166250-3166259 1217->1220 1220->1216 1223 3166286-316628d 1221->1223 1222->1223 1224->1212 1225->1212
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: <k
                                                                  • API String ID: 0-2323030726
                                                                  • Opcode ID: 325184cd07ebc0cf65241c2e56888510c5cd3bb839161ea5dcfc72f57fd7ee48
                                                                  • Instruction ID: 1c8faf25cfe4c2b07e03ccce12e70c25ab6ab9f053496a1470e7c0a4438c0939
                                                                  • Opcode Fuzzy Hash: 325184cd07ebc0cf65241c2e56888510c5cd3bb839161ea5dcfc72f57fd7ee48
                                                                  • Instruction Fuzzy Hash: 674122317042058FCB21CBA9D84086EB7B6FFCD224B1984BAD446CB312DB34EC16CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1226 31618a1-31618b8 1227 31618b9-31618ba 1226->1227 1228 3161880-316188e 1227->1228 1229 31618bc-31618bf 1227->1229 1228->1226 1230 31618c9-31618d4 1229->1230 1259 31618d6 call 3161edb 1230->1259 1260 31618d6 call 3161ee8 1230->1260 1231 31618dc-31618e2 1232 31618e4-3161920 1231->1232 1233 3161925-3161929 1231->1233 1246 3161ad7-3161ae0 1232->1246 1234 31619df-3161a04 1233->1234 1235 316192f-31619dd 1233->1235 1234->1246 1235->1234 1259->1231 1260->1231
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: p\uj
                                                                  • API String ID: 0-3505565089
                                                                  • Opcode ID: faae55ed4cf1a3f54013a3f9f8eef4e979144951bb48fe1237d4d9e2d3d1139d
                                                                  • Instruction ID: 5e82a6566d5c7b18ea68a14a55fa7f55cf5ea82aaab049993fd29d48fdb1e8a8
                                                                  • Opcode Fuzzy Hash: faae55ed4cf1a3f54013a3f9f8eef4e979144951bb48fe1237d4d9e2d3d1139d
                                                                  • Instruction Fuzzy Hash: 52417C35B002149FCB18DFA8E8946AEB7F7BFC9208B644469D8029B355CF34DC46CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b7fd6843a60aa7bfd4a49cffc776f24151712d35a3811993692090a5d34a3b81
                                                                  • Instruction ID: 1cd76c8f49fa7e86a29862a6e0a71318fbdc7d7316b7b1caf28eaf46ddc8345a
                                                                  • Opcode Fuzzy Hash: b7fd6843a60aa7bfd4a49cffc776f24151712d35a3811993692090a5d34a3b81
                                                                  • Instruction Fuzzy Hash: A71206797806118FCB08DF78D59482A37EAAF8C72871145A9E902CB375EF75EC52CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 68996560fa8f33b618b59c75fa98c9fe2d0ed50fec12cb12ad9dc02ecadabbc5
                                                                  • Instruction ID: b9e0ebca40ec7085c6481ce87c0b5d17da39f8dc8365ed19795e0c6a3f3be19d
                                                                  • Opcode Fuzzy Hash: 68996560fa8f33b618b59c75fa98c9fe2d0ed50fec12cb12ad9dc02ecadabbc5
                                                                  • Instruction Fuzzy Hash: 4DF16D31B006168BCB15DFA8D8506AEB7A6FFC8748F14882DD806EB744EF75DD168B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0193cf6f62ce31e4c95a223a06ef2fe68956919409090e6725141c36122e17fe
                                                                  • Instruction ID: 49bd85af760505a9db9aa367479eb9300aef548d3aefc08c45cc062bb1d0f60c
                                                                  • Opcode Fuzzy Hash: 0193cf6f62ce31e4c95a223a06ef2fe68956919409090e6725141c36122e17fe
                                                                  • Instruction Fuzzy Hash: E6F156357106048FCB54DF6AC499AAABBF6FF89324F1984A9E546CB761CB34EC10CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 320c6bedd3415b8931ab4f13cce46d026d68c5698a1fbc2413a6a55ca806a3ac
                                                                  • Instruction ID: bf325923d16f476727a4ca1c14d1f8ed532cc92bd2278fc4a7862b6d01adcd76
                                                                  • Opcode Fuzzy Hash: 320c6bedd3415b8931ab4f13cce46d026d68c5698a1fbc2413a6a55ca806a3ac
                                                                  • Instruction Fuzzy Hash: 6DB12735B102158FC716CFBAC4506AAB7FAEF88314B1588AEE516CB761CB31CC56C7A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6de81ec435541ece6ee6d5bffda5e7c0ed43b1058b67815c493fd56c3f654e0d
                                                                  • Instruction ID: bc1dff62f645708d8ada3ee6901b636e94abde7d67fe9ebd62108be56140208e
                                                                  • Opcode Fuzzy Hash: 6de81ec435541ece6ee6d5bffda5e7c0ed43b1058b67815c493fd56c3f654e0d
                                                                  • Instruction Fuzzy Hash: D1B16EB0B006418FC735CEA9C45466AB7F6BF48300B19882EE547E7791DB34EDA5CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d88510e908b9db536b2d0b4a491269f6f23bb46dde7fca98264512e4465e7d3
                                                                  • Instruction ID: 59779a4126e7ec2f92ddb6595a92cca8e1d0768a4cc6e42be0f8690ff98902c5
                                                                  • Opcode Fuzzy Hash: 1d88510e908b9db536b2d0b4a491269f6f23bb46dde7fca98264512e4465e7d3
                                                                  • Instruction Fuzzy Hash: 4381B331B05125DBCF398EA4895473EB6AABB8CB45F094429ED06CB348CB75CCA5CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79bde63c745b91f2f091809cfddef54b62a69a1e83362625854dae7fd23d51c2
                                                                  • Instruction ID: 8d273fabe1ca70842ade291729818dc5167714d7b2892374cf3354a072886b4b
                                                                  • Opcode Fuzzy Hash: 79bde63c745b91f2f091809cfddef54b62a69a1e83362625854dae7fd23d51c2
                                                                  • Instruction Fuzzy Hash: 33919D357002149FCB18EFA9E8546AE77B6FFC8704B14882CE906DB394DF759D098B92
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0f9191c3f6f65aa1dd19b05ad0140feeb4a8281807034655353e0803de52873a
                                                                  • Instruction ID: fa8e54c35c0380632bfbda98c95c7e320ec2af6bff68b4d3b00d301fa66b3363
                                                                  • Opcode Fuzzy Hash: 0f9191c3f6f65aa1dd19b05ad0140feeb4a8281807034655353e0803de52873a
                                                                  • Instruction Fuzzy Hash: 4B915874B00204DFCB18DFA5D884AAEBBF6BF88314F188069E9069B395DB35DD51CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf81975a6b775cc9a47ddb293a9d87393445c499a9710bb5c263c057112a9aef
                                                                  • Instruction ID: e18ec2022beb2d872e81da3ee78f9d0d245b4a4af21849d642ff6b8c130f57cc
                                                                  • Opcode Fuzzy Hash: bf81975a6b775cc9a47ddb293a9d87393445c499a9710bb5c263c057112a9aef
                                                                  • Instruction Fuzzy Hash: AC81AD35B006008FDB14DFB9D4949AEB7F6EF88618B2984A9D506CB7A1DF34EC15CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5e38a96db4ecce684fa64e6299a39c8efe4464f6536dad09a13f78b1f37e0f7b
                                                                  • Instruction ID: f2c4f5b45096fafa16559cc0fb3548f75d401b6c899646c573c2f0a7163f6524
                                                                  • Opcode Fuzzy Hash: 5e38a96db4ecce684fa64e6299a39c8efe4464f6536dad09a13f78b1f37e0f7b
                                                                  • Instruction Fuzzy Hash: 71A17C70A002069FCB15CFA8C48499ABBF1FF89304B25C8AED519EB361D771ED56CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 96ff06c96d47f0479133207a7f006308463bda63093531a4e025e9bac4e0332c
                                                                  • Instruction ID: 4f059959f85c2cda50112ea0b3d3676ff5d67e60f0cf6a5d91f7da23c7f62555
                                                                  • Opcode Fuzzy Hash: 96ff06c96d47f0479133207a7f006308463bda63093531a4e025e9bac4e0332c
                                                                  • Instruction Fuzzy Hash: 8E8190707007468FCB25DF69C4846AAB7F6FF88204B18892DD846CB794DB74E959CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46f16279340e0617dfa0c42a3067c743359c3a432719cdd1782fc99d404d0f7d
                                                                  • Instruction ID: b9691a394a27d64942debe4e3a1e6b8657c1acf0c1c3230476d358c900a3340a
                                                                  • Opcode Fuzzy Hash: 46f16279340e0617dfa0c42a3067c743359c3a432719cdd1782fc99d404d0f7d
                                                                  • Instruction Fuzzy Hash: FF517C35B002059FCB19EFA5D8586AE7BB6FF88704F188429E906EB384CF758D05CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 88a228df195e7ac2dea0a6b4aa363edccb935c974c098e56c0d94629c10d2c52
                                                                  • Instruction ID: 6905019bb8a7f91fc7cb372fb610b670b3d33fc837482b45d7419059110c2896
                                                                  • Opcode Fuzzy Hash: 88a228df195e7ac2dea0a6b4aa363edccb935c974c098e56c0d94629c10d2c52
                                                                  • Instruction Fuzzy Hash: 6C611A35B00204CFCB28DFA6D458AADB7BAFB4C311F159069E416AB2A4DF70EC55CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c286bb879ba0b11fa0c6e94fc45dc9e1a89c29ff555c4dce230ba406d7aacdda
                                                                  • Instruction ID: fdc68ed7c3cc2aacd3064089680fbd63362c9f62eac8c3d8ab843f85df011ba3
                                                                  • Opcode Fuzzy Hash: c286bb879ba0b11fa0c6e94fc45dc9e1a89c29ff555c4dce230ba406d7aacdda
                                                                  • Instruction Fuzzy Hash: 9451B130B106158FCB29CEE788946BBB7F6AB9C244F298579D502C7740DF30E999C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ab9f50d1e0cd8c9d2ca7b05efb668c1e019c87abd0702b7cc51042a6c652c09f
                                                                  • Instruction ID: 6ed43f10dbf426402ecbee2635fc749db51e5a2eeb8a956c60ba06b879e1e1ce
                                                                  • Opcode Fuzzy Hash: ab9f50d1e0cd8c9d2ca7b05efb668c1e019c87abd0702b7cc51042a6c652c09f
                                                                  • Instruction Fuzzy Hash: E261C4B5E002598FDB54CFA9D490A9EBBF5BF8C310F14806AE919EB314E7709D51CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b1e133ebe2e695d3b5d9f2a49e60e29e5f160ceb373b0cfa703dea6ca7f7480
                                                                  • Instruction ID: f677b8197ee5a0d70f763acf31817e9f0745a4c8316c662f3bbc6ee05666daf2
                                                                  • Opcode Fuzzy Hash: 7b1e133ebe2e695d3b5d9f2a49e60e29e5f160ceb373b0cfa703dea6ca7f7480
                                                                  • Instruction Fuzzy Hash: 2E518134A0060A8FCB10CF98C484AAABBF5FF49314F15C5AAD525CB2A1D730E865CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9ee5bd398b9efbab608761cf4241ae55e08cee012a8e561e3830cece571c934
                                                                  • Instruction ID: f5183e7f8bdabbcf59a68bc67954b7b286eac3861f8175e32a96e4c9cd0c9bbe
                                                                  • Opcode Fuzzy Hash: b9ee5bd398b9efbab608761cf4241ae55e08cee012a8e561e3830cece571c934
                                                                  • Instruction Fuzzy Hash: D251273130C761CBC7358ABAA810367B7EAAF8E600F19595AE583C7680DB24DAA1C711
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e37a11ee5a4dcb5c672a4098533ef246ac80dc320d9517f671e2f0aa9b6d9b6a
                                                                  • Instruction ID: cc00a41149dce56af6ddd5b2d577843c936d98ece6e03579236ee068f5386a7e
                                                                  • Opcode Fuzzy Hash: e37a11ee5a4dcb5c672a4098533ef246ac80dc320d9517f671e2f0aa9b6d9b6a
                                                                  • Instruction Fuzzy Hash: 73515D74A013059FCB15CF68D488A99BBF6BF49324F1981A9E845EF3A6CB31DC91CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d367209974af589713ed6b467e3fd162beb350106ff41de479901db42fb23a61
                                                                  • Instruction ID: 83faede3142b1c68060350c49c4a6e1b55158f91ba68df5b3f50ad635b402209
                                                                  • Opcode Fuzzy Hash: d367209974af589713ed6b467e3fd162beb350106ff41de479901db42fb23a61
                                                                  • Instruction Fuzzy Hash: 14515C74A002059FDB15CF68D484A99BBF6BF49324F1981A9E845EF3A6CB31EC81CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d1aba2337960dd49beb0797f89c743cfccaab0efc896ad2305090f6b9846e8b4
                                                                  • Instruction ID: c5d543e41e19d3ff17d800465f81a465cc3d0d23dc8f90605e372746e614751f
                                                                  • Opcode Fuzzy Hash: d1aba2337960dd49beb0797f89c743cfccaab0efc896ad2305090f6b9846e8b4
                                                                  • Instruction Fuzzy Hash: 00519E76A00109AFDB51CFA9D8449EEBBF6FB88310F14C16AE905DB211D731DA55CFA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 28c6b755971b68af63bc0c73e895bdcf4351f4d1c4fa9ebfe636eff53ad6190a
                                                                  • Instruction ID: 69e695752378c79d918c4a3b988e827e5d139376fab60caffa168f7c267eaf1c
                                                                  • Opcode Fuzzy Hash: 28c6b755971b68af63bc0c73e895bdcf4351f4d1c4fa9ebfe636eff53ad6190a
                                                                  • Instruction Fuzzy Hash: 6B418E30A002159FCB14DFA8D89099EB7F6FF88348F14882DE416EB350DF75AD068B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a60026cb15489eec4431b8e50402134ff342cebf2e5cdf400692d570ef32c2e
                                                                  • Instruction ID: 8dce5ef9482d8adce9819775d70becdf8582a6b3348d7ceef9a9d87e822a59ca
                                                                  • Opcode Fuzzy Hash: 5a60026cb15489eec4431b8e50402134ff342cebf2e5cdf400692d570ef32c2e
                                                                  • Instruction Fuzzy Hash: F0419BB1A043019FC715DFA8D8809AABBF1FF9A314B1489AEE845CB351D735EC45CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.905627009.0000000001860000.00000040.00000001.sdmp, Offset: 01860000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1860000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dd25708f6fc50800da630dbc5cb49949fff9bd79f4abb4c58862ce6431bd3bc7
                                                                  • Instruction ID: 4da55ccb064ee10caaa4a64c1e1171d0ebd1b54b02a23c3163f04ae97c68c9c4
                                                                  • Opcode Fuzzy Hash: dd25708f6fc50800da630dbc5cb49949fff9bd79f4abb4c58862ce6431bd3bc7
                                                                  • Instruction Fuzzy Hash: 4A315D35300606CFDF258F68D8207A57BA9EF85309F14402AF645CB2D1DB75CA52C766
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8ef296724e20f77ba8847dfd16dfe8539da4a9dfac0b0b66850b42062b825f59
                                                                  • Instruction ID: 2ea0c7a1721bafa26ee49b4382962eda0a1b4bda8777b7e855f63a81999ad5e1
                                                                  • Opcode Fuzzy Hash: 8ef296724e20f77ba8847dfd16dfe8539da4a9dfac0b0b66850b42062b825f59
                                                                  • Instruction Fuzzy Hash: 7A31B535B006069BCB14DFA6D8406AFB7B6FF88340F148829D5559B760DB30ED55CBD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3d06ab7f2fce63c7fe7de9890206275a9d9d7c3bb32b1931d42d3053214e0be6
                                                                  • Instruction ID: 993a39058e7845f71ca6342ed61d11406a330099969d772b3aecc3ed8c5c6394
                                                                  • Opcode Fuzzy Hash: 3d06ab7f2fce63c7fe7de9890206275a9d9d7c3bb32b1931d42d3053214e0be6
                                                                  • Instruction Fuzzy Hash: 594113747006148FCB08DF69C489A6ABBF9FF88714B1584A9E516CB372CB71E950CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4a54607e7b509e393b7a2551f0e1c60316b2e4900450de639e1759011aee3896
                                                                  • Instruction ID: ebe8f0ce08d34bd471e81fc72f37d2f0c006bf188a2804db4608718e1cfb10c5
                                                                  • Opcode Fuzzy Hash: 4a54607e7b509e393b7a2551f0e1c60316b2e4900450de639e1759011aee3896
                                                                  • Instruction Fuzzy Hash: 19416B74A01615CFC714CFA9C9808AAFBF6FF49304B2585AAD906DB761C730EC55CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b63b12311cb0bc0c060d77f67a1ba02de7d08763e9d6d7248ba8d2aee3dc8697
                                                                  • Instruction ID: bcb4cc99906403642a15e39de3da15c2ad60149b498e166860b1669574cca881
                                                                  • Opcode Fuzzy Hash: b63b12311cb0bc0c060d77f67a1ba02de7d08763e9d6d7248ba8d2aee3dc8697
                                                                  • Instruction Fuzzy Hash: 1841D1316003409FC325CF24D484A96BBF2FF85318B2989AEE5858F762C771ED5ACB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c8aad87cc771b0f0fdbf1114bdc1782e24e2367b66c030167d0c062e030fe39e
                                                                  • Instruction ID: bf7935371f5c139b4c3bd3c080530d8ebe7b43a0f4616bf3bd1b23635829e415
                                                                  • Opcode Fuzzy Hash: c8aad87cc771b0f0fdbf1114bdc1782e24e2367b66c030167d0c062e030fe39e
                                                                  • Instruction Fuzzy Hash: 153148347002048FDB19CF69C989A6ABFF5BF49714B1984AEE916CB372C775E844CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ffbb3e9dc630e6c1d6ffd2b02d4c3279a14932fd04ab67b198065f9a2efe389b
                                                                  • Instruction ID: 6dd4a2824237baa420f5760fbc9a6ab811a7ab2629d0e46b67bac6d1420549bf
                                                                  • Opcode Fuzzy Hash: ffbb3e9dc630e6c1d6ffd2b02d4c3279a14932fd04ab67b198065f9a2efe389b
                                                                  • Instruction Fuzzy Hash: EB316B31B001149FDB05DFA8D944ABEBBBABF88310F248059E505DB2A5CB31DD15DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8bbadd5ef9f0c76e3217d2f4715aadb48f6c9e9c12a8cbc301ff03aa139e375
                                                                  • Instruction ID: e2bda104f7f0bcd3e4a64ad2e42cb5e89893c0148d53546adc7ecbc9a05feb2c
                                                                  • Opcode Fuzzy Hash: d8bbadd5ef9f0c76e3217d2f4715aadb48f6c9e9c12a8cbc301ff03aa139e375
                                                                  • Instruction Fuzzy Hash: 3B31BD75B003159FDB289BB5D85466EBBAAAF88314F18413CE9029F384CF71CC56CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a731c527f448d57a9de84017f3a86690da0383146833bc1279aa27ae6913f326
                                                                  • Instruction ID: 7a3fab491a975ef41037b4239f8a71cad7842ca8412915326cdd0fa65fb46640
                                                                  • Opcode Fuzzy Hash: a731c527f448d57a9de84017f3a86690da0383146833bc1279aa27ae6913f326
                                                                  • Instruction Fuzzy Hash: 48212A313101109FC718DF7AD59892AB7EABFCDA51B1940A9E50ACB3B1DB71DC45CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9243bedd9d8d1229c03cb7b8281db27ed675e9b935356de3704d55dcc0f7db23
                                                                  • Instruction ID: d0ef807bc27a271d5bfaaa5afcfc6480e42e71f06daf1083f9ba58aa7c63821b
                                                                  • Opcode Fuzzy Hash: 9243bedd9d8d1229c03cb7b8281db27ed675e9b935356de3704d55dcc0f7db23
                                                                  • Instruction Fuzzy Hash: F9217C387001159FCB249F65E8186AE7BA6FB8A340F048929F802D7384DB759E158FA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5bdf19ce33a1d808001cdf1f9f9a0eb63759aa1b92da84162c77507d69f5a3d5
                                                                  • Instruction ID: 16b43aaf4ee643187831e20340dd86a787718fbdc762a94323f39ce751469583
                                                                  • Opcode Fuzzy Hash: 5bdf19ce33a1d808001cdf1f9f9a0eb63759aa1b92da84162c77507d69f5a3d5
                                                                  • Instruction Fuzzy Hash: 96316D71A00205CFC714DFA9D488A9A77FAFF49311B2588ADE806DB361DB30ED52CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d09f5acab78f8fd596ff86bff0d0d95259753944ec4d1d82e74687a006a56690
                                                                  • Instruction ID: 14c02a9cca0d0d271e07fea1169c2c1e4773905c15c361762d3dcd08aa908d94
                                                                  • Opcode Fuzzy Hash: d09f5acab78f8fd596ff86bff0d0d95259753944ec4d1d82e74687a006a56690
                                                                  • Instruction Fuzzy Hash: 2D2123317093519FD7278F76D480A12BBB6EF86328B1881BED84ACB663C731D895C751
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a16fb10eaf91cc36214090b270a17aae587afb686ebf615baf7eadd5397770b0
                                                                  • Instruction ID: d0aa7287187526fcf42fe3ace7939092250dce46d301273a2d1c160b1a3645a4
                                                                  • Opcode Fuzzy Hash: a16fb10eaf91cc36214090b270a17aae587afb686ebf615baf7eadd5397770b0
                                                                  • Instruction Fuzzy Hash: 01218C75A002559FCB159FA4E8445AEBBF6FF8A340B04852DF902D7340DB359E15CFA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ecdbf75152463cf3fabf3748ac4b2680465c348e6d2fedaa75e4f668e301900f
                                                                  • Instruction ID: 1cb460306db20e3aa7e36bba78ed6abb4565aa4b95c3970479496d49293f1e6a
                                                                  • Opcode Fuzzy Hash: ecdbf75152463cf3fabf3748ac4b2680465c348e6d2fedaa75e4f668e301900f
                                                                  • Instruction Fuzzy Hash: CF11E3737082664FE728DAAAE8406ABF7E9EBC8231B1C8537E504C7140D7359421CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf5656dcc96421a4c10cb9e53c75e505add7767096e530b2ac363b7d51e33a05
                                                                  • Instruction ID: 06c4306891c860e5a781a547498ed5bf7b235f80806679a0cce89dc5bf16060f
                                                                  • Opcode Fuzzy Hash: bf5656dcc96421a4c10cb9e53c75e505add7767096e530b2ac363b7d51e33a05
                                                                  • Instruction Fuzzy Hash: 701191313052108BD7259F7BB45416DF7AAFFC562671C847BE10AC6244CF35C942DB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3931eb142bcf39103f3f6ada0a95359dbbbfce562fa51408739867b2117df4e9
                                                                  • Instruction ID: 118bce74e9cf40c881be775cbe793d64382913d59b74bc282379fb9ed24cb1d9
                                                                  • Opcode Fuzzy Hash: 3931eb142bcf39103f3f6ada0a95359dbbbfce562fa51408739867b2117df4e9
                                                                  • Instruction Fuzzy Hash: 6111E676B026148FC722CB699880A6EB7F6EFCD650718406AE905DB365DB30DC02C7A0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5c0925a38487150ec50b8cb3bb4a1f6a659866b73d2961cc0595b38d538a1d0
                                                                  • Instruction ID: 48a8d9cf62749d6ef7cd38557996ac9821af8a35d9cd0f9fae4a10af26615219
                                                                  • Opcode Fuzzy Hash: e5c0925a38487150ec50b8cb3bb4a1f6a659866b73d2961cc0595b38d538a1d0
                                                                  • Instruction Fuzzy Hash: BC21DE75601350DFC726CFA8D8808AABBB5FF8A31471489AAE805CB352C732EC49CB50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: beceb3b40a7b3faf3d8c8d3bc075191476da7ee15be1191a5f8f894a2b890815
                                                                  • Instruction ID: eba5bc1304e42d5a2327b2b20cb2b750da7c796cc1bc719023fc80e639475166
                                                                  • Opcode Fuzzy Hash: beceb3b40a7b3faf3d8c8d3bc075191476da7ee15be1191a5f8f894a2b890815
                                                                  • Instruction Fuzzy Hash: 631103357002008FCB24DB39D58899A77FAEF8961871484ADDA1ACF771CB71EC04CB80
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8df70533f99622f23eb1713f6fb06d283536abb16403ca39b1b2bb71fc28fa3d
                                                                  • Instruction ID: c03be577af64631eeba85457abb5066ad8ce0e4f865e4f18954af5acedc54e58
                                                                  • Opcode Fuzzy Hash: 8df70533f99622f23eb1713f6fb06d283536abb16403ca39b1b2bb71fc28fa3d
                                                                  • Instruction Fuzzy Hash: BE1103323042106FD315CF64E840BAA7BB9FF85324F2484AAE505CB281D7729D068BA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72230c5333e3438a0c8132cf607f9863ea47cf3581aba2d9c993a03bda831531
                                                                  • Instruction ID: b260da09e11f923484782cea35fd12d0875d0a46d5a20b56642fd93d5bcb3676
                                                                  • Opcode Fuzzy Hash: 72230c5333e3438a0c8132cf607f9863ea47cf3581aba2d9c993a03bda831531
                                                                  • Instruction Fuzzy Hash: 8B21CD316013409FD325CF25D484E46BBF6FF99324B6584AEE4868B7A2CB31ED49CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e150078cddbd91ddcb09f2b73a7dfe044a20bca862d4c8bf260337bfa047db31
                                                                  • Instruction ID: 2d8c0b21d2af8b2670a1ce4065ddc224825b9a271d248685cb028bd4c81d551a
                                                                  • Opcode Fuzzy Hash: e150078cddbd91ddcb09f2b73a7dfe044a20bca862d4c8bf260337bfa047db31
                                                                  • Instruction Fuzzy Hash: A0219035A012099FCB01DF78D8085DEBBB2FFCA725B1480AAD945DB355DB309E1ACB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bd6e7671f0c5dfe9f8a8d39b2e1f55f86f6f839eb59719ce551fd44d8fd88331
                                                                  • Instruction ID: 04de9913e82cd60dc42f7df5c51bda2d0c91bd0d99502d21a7f114b660b6ec67
                                                                  • Opcode Fuzzy Hash: bd6e7671f0c5dfe9f8a8d39b2e1f55f86f6f839eb59719ce551fd44d8fd88331
                                                                  • Instruction Fuzzy Hash: DF11C836B016254FD325D6699880B6FB3DADBDC660F14413AEA05DB790DF70EC0187E0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bf0fbeaee62ed2fd72246c92c8497efea324296510fac2cabab34e198f51d49d
                                                                  • Instruction ID: d69d6a403551411bfab9b192590bb352e8e81637fff75b7c47485ea954bbdc20
                                                                  • Opcode Fuzzy Hash: bf0fbeaee62ed2fd72246c92c8497efea324296510fac2cabab34e198f51d49d
                                                                  • Instruction Fuzzy Hash: AD01D63071D12157DB25966F545476AA5CEEBC8740F28C03AA507C7BC4DF28C8A6C361
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: be8924ba32c55c144d091cf2fcc9f5d754f14b25b4a323f8fdd5bbfe424a4eb8
                                                                  • Instruction ID: 43c2f72879131213822d5aa6f50423356813e5b4924e4256229f5a11af607b75
                                                                  • Opcode Fuzzy Hash: be8924ba32c55c144d091cf2fcc9f5d754f14b25b4a323f8fdd5bbfe424a4eb8
                                                                  • Instruction Fuzzy Hash: 23116A74E0125A8FCB05CFA9C490AAEFBF5FF8D200F14846AD818E7210D3309956CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 68c550531be17ccde8b6c38c3a607b26c3099de828b72688515aa9644dbddb2b
                                                                  • Instruction ID: b8319022a5619ec008553040c20e1d0eb3649aff75f5b187ae0453a988f6aa65
                                                                  • Opcode Fuzzy Hash: 68c550531be17ccde8b6c38c3a607b26c3099de828b72688515aa9644dbddb2b
                                                                  • Instruction Fuzzy Hash: CF110630B102159FC725DF65D460AAFB7B6FB88310F114919E942DB340DB70ED0A8BA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1199569cb471d0ebd8d2b81848f498c984ba62f7f885998b3672d10e14ff28c1
                                                                  • Instruction ID: d88f4e796342d79a5966b654c4a4e20ad6fe2c4be6297659343db66d20ef00ae
                                                                  • Opcode Fuzzy Hash: 1199569cb471d0ebd8d2b81848f498c984ba62f7f885998b3672d10e14ff28c1
                                                                  • Instruction Fuzzy Hash: E801B532B456104FD312C769D850A5ABBE6EB95361F19C0ABEA45CB351CB31DC058790
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d4ef825d0e603f37b6eb55773b663bde8223941398030d74810a891a5ac885cd
                                                                  • Instruction ID: 1fcfb67b198d7d2a73b7266149e0b9a5cc420d4e0c1cdc2771ebd0ab528d2f53
                                                                  • Opcode Fuzzy Hash: d4ef825d0e603f37b6eb55773b663bde8223941398030d74810a891a5ac885cd
                                                                  • Instruction Fuzzy Hash: 79110C31200B058FC724DF29D88188BB7F1FF853547508E2DE54A8BB65EBB5AD198BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8985b84e9b309210fb7faf029b3d4eb48d7c189fd80481df6466a67c4ccab612
                                                                  • Instruction ID: 3e3e2861fa9d6b36f271c5ce4f9a1913153fb7bd6bacb862b248c2f9ae578cf5
                                                                  • Opcode Fuzzy Hash: 8985b84e9b309210fb7faf029b3d4eb48d7c189fd80481df6466a67c4ccab612
                                                                  • Instruction Fuzzy Hash: A6113C35E01248AFDB04CFA4D955AEDBFF2AF8D310F148569E815B7351CB325A14CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6ffe256e87564ed4561e030364c8ad406c15f1b7b7089f6b54a76c25cacd7a3
                                                                  • Instruction ID: bc2de1f5cb6e0258d98fc628720d8a18a22fc0b66c97a7cf03c9664c7aed0115
                                                                  • Opcode Fuzzy Hash: c6ffe256e87564ed4561e030364c8ad406c15f1b7b7089f6b54a76c25cacd7a3
                                                                  • Instruction Fuzzy Hash: 97F08133304119AF8B10DE99EC84DBFBBEEFBCC664718852AF509C3240DB3199119B50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7722c23ccfe4c2f27d13dbabf87c027a88c6e7474b117011033b951aece273c8
                                                                  • Instruction ID: ef842bf2dc3a2d07094933dd091cd7f3d0668f8e06f4e0367285468de61305e9
                                                                  • Opcode Fuzzy Hash: 7722c23ccfe4c2f27d13dbabf87c027a88c6e7474b117011033b951aece273c8
                                                                  • Instruction Fuzzy Hash: 1701A936B406144FD311C75AD854D56BBE6FBC9761B19C07AE645CB351CB31DC058790
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 576e43419132cc617a44a0864d442e832cd5d0b5eca27240cfada4af296fba07
                                                                  • Instruction ID: 1b4c294ebaf607cfe501e3f473ad62c4369364e98516479c71ebf0b9d89aefa2
                                                                  • Opcode Fuzzy Hash: 576e43419132cc617a44a0864d442e832cd5d0b5eca27240cfada4af296fba07
                                                                  • Instruction Fuzzy Hash: 6201A131200B468FC324DF29D44088A7BF1BF852043548A6DE48A8BBA1EB71ED198BD0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 735a4cb1c83daa5e99cc053688fdec7742cfc8ba458d6f1253f24e4ef75576d9
                                                                  • Instruction ID: 345d722371c80443fde928e07423a263036e1b27820803a7623e27ffa26f33ba
                                                                  • Opcode Fuzzy Hash: 735a4cb1c83daa5e99cc053688fdec7742cfc8ba458d6f1253f24e4ef75576d9
                                                                  • Instruction Fuzzy Hash: 9401C931200B068BC724DF29D48188BB7F5AF852547508E2DE54A8BB64EBB5BD198BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 32eee10e350b5d01fed4de612e29b47ff964cce4decf867fde8e1318c0847ab5
                                                                  • Instruction ID: f9ac2a071a295c93102495ce517fdf33cf98930773a2ea83b6498dd7d5704de5
                                                                  • Opcode Fuzzy Hash: 32eee10e350b5d01fed4de612e29b47ff964cce4decf867fde8e1318c0847ab5
                                                                  • Instruction Fuzzy Hash: 0201DA31200B058BC724DF29E48188BB7F6FF852547508E2DE54A8BB65EBB1FD198BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 96f9a470b58a32ba90e3e73003bd86bf179e6f96f2ba3d55e32a18885173d6f8
                                                                  • Instruction ID: 1f2eb529bb798adae5f4a8c9d45b700b6048b1b7a9d12b44a4fb3ed705773580
                                                                  • Opcode Fuzzy Hash: 96f9a470b58a32ba90e3e73003bd86bf179e6f96f2ba3d55e32a18885173d6f8
                                                                  • Instruction Fuzzy Hash: 88011374E00218AFDB04DFA5D954AEEBBF6AF8D310F248469E815B7351CB715A18CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 267efaccbe130d91bb9f53389dcf5e7ad36f42c06c5eb6465548aa345e2bfd85
                                                                  • Instruction ID: 2cd9d83004559e058a07f3e96444362b2d738617424473852d4c7b341c3d63cb
                                                                  • Opcode Fuzzy Hash: 267efaccbe130d91bb9f53389dcf5e7ad36f42c06c5eb6465548aa345e2bfd85
                                                                  • Instruction Fuzzy Hash: 0EF062357053805FC3278F35A454A527FB5EFCA22972844BEED4ACB352DA36D80ACB10
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 82fe74eaefd66e6a1e85d752a7aa8fc43285fbd2a1213ce05fa1654f855e059b
                                                                  • Instruction ID: f89dbb2d8de57d64dc489711b48d182901d2c21b61ea968b4f5e61336957af47
                                                                  • Opcode Fuzzy Hash: 82fe74eaefd66e6a1e85d752a7aa8fc43285fbd2a1213ce05fa1654f855e059b
                                                                  • Instruction Fuzzy Hash: 8BF06D393109008FCB58DB3AD55896977EBAFCD61972980BAE606CB7B1EF70CC018A51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e73fee39ee2fe7eea6fe22eee3e344c8514055313ca485fe72891bacb7bad80
                                                                  • Instruction ID: 3d9ad6043b4384530562dbfea2b60d9c1914b28594b8a5c1706b577453879a30
                                                                  • Opcode Fuzzy Hash: 8e73fee39ee2fe7eea6fe22eee3e344c8514055313ca485fe72891bacb7bad80
                                                                  • Instruction Fuzzy Hash: B6F0DA393105104F8758DA3ED45886977EA9FCD62571580A9E606CB770EFB0DC018A51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9797cdc441b902903ed460a7a6c3777848f5e911365509a3b7b3d5f9af84ac62
                                                                  • Instruction ID: a0d45996855648c668c0f80d9f333a97859256c6b700ece7a74caf40d7ea4c32
                                                                  • Opcode Fuzzy Hash: 9797cdc441b902903ed460a7a6c3777848f5e911365509a3b7b3d5f9af84ac62
                                                                  • Instruction Fuzzy Hash: FAF0A07370401A5F8F10CA69AC84AFFBBEEEB8C624B08482BE408D3240EF30C9158710
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc622e4e4b05033b3fb2d4802c1f2e60c727aae0e2cea2ae203b9910a745e93a
                                                                  • Instruction ID: b46b92cfe4078dde2ce394931af08c74762759ee79461949ba0da97e211ef586
                                                                  • Opcode Fuzzy Hash: dc622e4e4b05033b3fb2d4802c1f2e60c727aae0e2cea2ae203b9910a745e93a
                                                                  • Instruction Fuzzy Hash: 26F012393017505BC3358E36A4549137BB6FBC9265314457DE94A87355CE36E805C750
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d09e2acc86ce1eb11169dbc858039ef432a49bd9aaa70efdcdbe6de0fc9c1acb
                                                                  • Instruction ID: 93769f8f86655470aa68cd191f4097578ecfd2105dd94ae8936a50cd22085026
                                                                  • Opcode Fuzzy Hash: d09e2acc86ce1eb11169dbc858039ef432a49bd9aaa70efdcdbe6de0fc9c1acb
                                                                  • Instruction Fuzzy Hash: 59F0BE20B1D7E10FC3178A7A4430456BFF16F4A21031840DFD892CB787CA68C94A8BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7a4384bf1ebe7d0c18525e1fa7eaf90c09cb9bee31ce7dd3a806c8c698f9e21e
                                                                  • Instruction ID: 56bfe5c90d77cb90dc5b8fcf3b7ce56816fd5a48decbb6bc9a5476bb7a2aa93a
                                                                  • Opcode Fuzzy Hash: 7a4384bf1ebe7d0c18525e1fa7eaf90c09cb9bee31ce7dd3a806c8c698f9e21e
                                                                  • Instruction Fuzzy Hash: 51F0FE76B01115CFCB15DFA8D9C086EB7B5FF98325B204169D905AB365C730EC51CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a49e64be4d2be3d5d929db2e70b764c7556c632a7a2a793bb764743d52a485c2
                                                                  • Instruction ID: 01c3091121f69f262e0e9e760f20ddb89ff12249ee1ab56109a4a9b3dded5f5f
                                                                  • Opcode Fuzzy Hash: a49e64be4d2be3d5d929db2e70b764c7556c632a7a2a793bb764743d52a485c2
                                                                  • Instruction Fuzzy Hash: AFE04F373001149BC7109A4EE404D9ABBADDBD9771B048037FA08C7320CA71DC52C7A4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46b773d5f6b1ee0ccb414aeb325cc08441961d5a95583993b11fd16a902619a6
                                                                  • Instruction ID: 79a36593f9f25eb563e0b461abffef891bcb546545f6c92361148d3c75351f7a
                                                                  • Opcode Fuzzy Hash: 46b773d5f6b1ee0ccb414aeb325cc08441961d5a95583993b11fd16a902619a6
                                                                  • Instruction Fuzzy Hash: C6E08C312093848FCF865B3494281587FB49F87204B1480AED846CF293CA3A5C0AC792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8112e8f10326c9b489d645351defdea516ddbdc43eb1b1add65c422490848ef
                                                                  • Instruction ID: f416a456b0f5eebf7e33fa827f2e014d35a959310a2721a0568e6985bd2129f1
                                                                  • Opcode Fuzzy Hash: d8112e8f10326c9b489d645351defdea516ddbdc43eb1b1add65c422490848ef
                                                                  • Instruction Fuzzy Hash: 2CC0123130030487CE589B68A41845D7BDD9788204B408025A50B9B384DE756C1687D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Non-executed Functions

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d91933d8f8b7dd51d09967ea98d5162330cf9f8e62279f4d756a7943c5e71173
                                                                  • Instruction ID: 43986dc325c0afe939bde7372f73186717fa67ae34f6093ca2d92ead8f43a8cc
                                                                  • Opcode Fuzzy Hash: d91933d8f8b7dd51d09967ea98d5162330cf9f8e62279f4d756a7943c5e71173
                                                                  • Instruction Fuzzy Hash: 47C23A34A00218CFCB25DFA4C894BADBBB2FF49305F1485A9D84AAB354DB759D91CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70257fdc8e38c85e4ca57b03b2428a79c85a77745512a21c499dd85fcfcb94c2
                                                                  • Instruction ID: 4bc9d355200c1b1a5691817311370531b22e0dcd868d5ff89f973c5fc93c1483
                                                                  • Opcode Fuzzy Hash: 70257fdc8e38c85e4ca57b03b2428a79c85a77745512a21c499dd85fcfcb94c2
                                                                  • Instruction Fuzzy Hash: FF621BB06002009FD748DF69D45475A7AE6BBC430CF64C85CD10A9F796DBBADA0B8BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2158b5c6d3677f06f8c7410c34422dace2dfb5f43926e1c703bc1f25c92f1627
                                                                  • Instruction ID: 0cb3bed5751b2a831b17075bca46b8238227edd64499946808327029838440d7
                                                                  • Opcode Fuzzy Hash: 2158b5c6d3677f06f8c7410c34422dace2dfb5f43926e1c703bc1f25c92f1627
                                                                  • Instruction Fuzzy Hash: 776219B06002009FD748DF69D45475A7AE6BBC430CF64C85CD10A9F796DBBADA0B8BE1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.907040669.0000000003160000.00000040.00000001.sdmp, Offset: 03160000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_3160000_y3t4g48gj6_PAYMENT.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Kk$Kk$Kk$Kk
                                                                  • API String ID: 0-3874504661
                                                                  • Opcode ID: 9b6ad28554bacd28967bda16a6df08ae0b7aee3251d46ec2180cee2cb0484189
                                                                  • Instruction ID: e34ab3f57e73b01207db1a7ba52dc9b00fc723c931316c2cee3ec76bf5861b3f
                                                                  • Opcode Fuzzy Hash: 9b6ad28554bacd28967bda16a6df08ae0b7aee3251d46ec2180cee2cb0484189
                                                                  • Instruction Fuzzy Hash: C821D1363442204F8714EBBEB49062EB2D6EFC8698718847ED60ACF750EF21DC1583A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%